From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Black-box approach for testing quality of service in case of security incidents on the example of a SIP-based VoIP service: work in progress., , , и . IPTComm, стр. 101-110. ACM, (2010)Voice calls for free: How the black market establishes free phone calls - Trapped and uncovered by a VoIP honeynet., , , и . PST, стр. 205-212. IEEE Computer Society, (2013)Abusing Trust: Mobile Kernel Subversion via TrustZone Rootkits., , , и . SP (Workshops), стр. 265-276. IEEE, (2022)A robust and flexible test environment for VoIP security tests., , , и . ICITST, стр. 1-6. IEEE, (2010)Extraction of ABNF Rules from RFCs to Enable Automated Test Data Generation., , , , и . SEC, том 405 из IFIP Advances in Information and Communication Technology, стр. 111-124. Springer, (2013)Trapping and analyzing malicious VoIP traffic using a honeynet approach., , , , и . ICITST, стр. 442-447. IEEE, (2011)Dataset of Developer-Labeled Commit Messages., , , и . MSR, стр. 490-493. IEEE Computer Society, (2015)Prying Open Pandora's Box: KCI Attacks against TLS., , , и . WOOT, USENIX Association, (2015)Generic Approach for Security Error Detection Based on Learned System Behavior Models for Automated Security Tests., , , и . ICST Workshops, стр. 453-460. IEEE Computer Society, (2013)Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach., , , , и . NSS, том 7873 из Lecture Notes in Computer Science, стр. 628-634. Springer, (2013)