From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Analysis of the iKee.B iPhone Botnet., , и . MobiSec, том 47 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 141-152. Springer, (2010)An Inside Look at Botnets, и . Special Workshop on Malware Detection, Advances in Information Security, (2006)A Security-Mode for Carrier-Grade SDN Controllers., , , , , , , и . ACSAC, стр. 461-473. ACM, (2017)BottleNet: Hiding Network Bottlenecks Using SDN-Based Topology Deception., , , , , и . IEEE Trans. Inf. Forensics Secur., (2021)CLARION: Sound and Clear Provenance Tracking for Microservice Deployments., , , , и . USENIX Security Symposium, стр. 3989-4006. USENIX Association, (2021)Automated Categorization of Onion Sites for Analyzing the Darkweb Ecosystem., , , , и . KDD, стр. 1793-1802. ACM, (2017)BLADE: Slashing the Invisible Channel of Drive-by Download Malware., , , и . RAID, том 5758 из Lecture Notes in Computer Science, стр. 350-352. Springer, (2009)AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks., , , , , и . INFOCOM, стр. 1788-1797. IEEE, (2020)Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks., , , , и . DSN, стр. 249-260. IEEE Computer Society, (2017)BASTION: A Security Enforcement Network Stack for Container Networks., , , , , и . USENIX ATC, стр. 81-95. USENIX Association, (2020)