From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads., , , , и . USENIX Security Symposium, стр. 171-184. USENIX Association, (2008)Masquerade: Simulating a Thousand Victims., , , и . login Usenix Mag., (2008)Designing Toxic Content Classification for a Diversity of Perspectives., , , , , , , и . SOUPS @ USENIX Security Symposium, стр. 299-318. USENIX Association, (2021)English shellcode., , , и . ACM Conference on Computer and Communications Security, стр. 524-533. ACM, (2009)The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves., , , , и . AsiaCCS, стр. 73-85. ACM, (2019)Emerging Threats in Internet of Things Voice Services., , , , , , и . IEEE Secur. Priv., 17 (4): 18-24 (2019)Multi-stage replay with crosscut., , , , , , , и . VEE, стр. 13-24. ACM, (2010)Tracing your roots: exploring the TLS trust anchor ecosystem., , , , и . Internet Measurement Conference, стр. 179-194. ACM, (2021)Security Challenges in an Increasingly Tangled Web., , , , , , и . WWW, стр. 677-684. ACM, (2017)Jetset: Targeted Firmware Rehosting for Embedded Systems., , , , , , и . USENIX Security Symposium, стр. 321-338. USENIX Association, (2021)