From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

"Good" worms and human rights., и . SIGCAS Comput. Soc., 38 (1): 28-39 (2008)A brief history of just-in-time.. ACM Comput. Surv., 35 (2): 97-113 (2003)Ethical Proactive Threat Research., и . Financial Cryptography Workshops, том 6054 из Lecture Notes in Computer Science, стр. 231-239. Springer, (2010)Computer Viruses and Malware. Advances in Information Security Springer, (2006)Teaching Spam and Spyware at the University of C@1g4ry.. CEAS, (2006)Entombed: An archaeological examination of an Atari 2600 game., и . Art Sci. Eng. Program., 3 (2): 4 (2019)Binary Reverse Engineering for All.. ITiCSE (1), стр. 243-249. ACM, (2023)Exercises for teaching reverse engineering., , , и . ITiCSE, стр. 188-193. ACM, (2018)Code Obfuscation Using Pseudo-random Number Generators., , и . CSE (3), стр. 418-423. IEEE Computer Society, (2009)The Sincerest Form of Flattery: Large-Scale Analysis of Code Re-Use in Atari 2600 Games., , , , и . FDG, стр. 26:1-26:10. ACM, (2022)