From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fault-Tolerant Middleware and the Magical 1%., и . Middleware, том 3790 из Lecture Notes in Computer Science, стр. 431-441. Springer, (2005)Peek-a-boo: Inferring program behaviors in a virtualized infrastructure without introspection., , , и . Comput. Secur., (2018)Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns., , , и . NDSS, The Internet Society, (2017)When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World., , , , и . USENIX Security Symposium, стр. 3487-3504. USENIX Association, (2021)SharkFin: Spatio-temporal mining of software adoption and penetration., , , , и . Soc. Netw. Anal. Min., 4 (1): 240 (2014)Improving the Dependability of Distributed Systems through AIR Software Upgrades.. Carnegie Mellon University, USA, (2010)Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State., , , , и . PAM, том 10176 из Lecture Notes in Computer Science, стр. 113-125. Springer, (2017)The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching., , , , и . IEEE Symposium on Security and Privacy, стр. 692-708. IEEE Computer Society, (2015)Shallow-Deep Networks: Understanding and Mitigating Network Overthinking., , и . ICML, том 97 из Proceedings of Machine Learning Research, стр. 3301-3310. PMLR, (2019)Toward Semantic Cryptography APIs., , , и . SecDev, стр. 9-14. IEEE Computer Society, (2016)