From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identifying Useful Features for Malware Detection in the Ember Dataset., , и . CANDAR Workshops, стр. 360-366. IEEE, (2019)Trends of anti-analysis operations of malwares observed in API call logs.. J. Comput. Virol. Hacking Tech., 14 (1): 69-85 (2018)Control of system calls from outside of virtual machines., , и . SAC, стр. 2116-1221. ACM, (2008)Load-based covert channels between Xen virtual machines., и . SAC, стр. 173-180. ACM, (2010)Grammar Compression of Call Traces in Dynamic Malware Analysis., и . J. Inf. Process., (2017)BitVisor: a thin hypervisor for enforcing i/o device security., , , , , , , , , и 4 other автор(ы). VEE, стр. 121-130. ACM, (2009)A 1-Tb 4b/Cell 4-Plane 162-Layer 3D Flash Memory With a 2.4-Gb/s I/O Speed Interface., , , , , , , , , и 39 other автор(ы). ISSCC, стр. 130-132. IEEE, (2022)MobileScope: A Programming Language with Objective Mobility., , , и . ICDCS Workshops, стр. 542-547. IEEE Computer Society, (2004)A Virtual Machine Migration System Based on a CPU Emulator., и . VTDC@SC, стр. 3. IEEE, (2006)Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism., , , , и . CODASPY, стр. 127-134. ACM, (2018)