From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface (Transcript of Discussion).. Security Protocols Workshop, том 9379 из Lecture Notes in Computer Science, стр. 139-144. Springer, (2015)Security Metrics for the Android Ecosystem., , и . SPSM@CCS, стр. 87-98. ACM, (2015)The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface., , , , и . Security Protocols Workshop, том 9379 из Lecture Notes in Computer Science, стр. 126-138. Springer, (2015)Getting Bored of Cyberwar: Exploring the Role of the Cybercrime Underground in the Russia-Ukraine Conflict., , , , , и . CoRR, (2022)When will my PLC support Mirai? The security economics of large-scale attacks against Internet-connected ICS devices., , и . eCrime, стр. 1-14. IEEE, (2020)Getting Bored of Cyberwar: Exploring the Role of Low-level Cybercrime Actors in the Russia-Ukraine Conflict., , , , , и . WWW, стр. 1596-1607. ACM, (2024)Device analyzer: a privacy-aware platform to support research on the Android ecosystem., , , и . WISEC, стр. 34:1-34:2. ACM, (2015)Ethical issues in research using datasets of illicit origin., , , , и . Internet Measurement Conference, стр. 445-462. ACM, (2017)Booting the Booters: Evaluating the Effects of Police Interventions in the Market for Denial-of-Service Attacks., , , и . Internet Measurement Conference, стр. 50-64. ACM, (2019)Measuring eWhoring., , , и . Internet Measurement Conference, стр. 463-477. ACM, (2019)