From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An interface diversified honeypot for malware analysis., , и . ECSA Workshops, стр. 29. ACM, (2016)A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification., , , , , , и . NordSec, том 10014 из Lecture Notes in Computer Science, стр. 152-168. (2016)Security in container-based virtualization through vTPM., , и . UCC, стр. 214-219. ACM, (2016)A Survey on Application Sandboxing Techniques., , и . CompSysTech, стр. 141-148. ACM, (2017)A Survey on Anti-honeypot and Anti-introspection Methods., , , и . WorldCIST (2), том 570 из Advances in Intelligent Systems and Computing, стр. 125-134. Springer, (2017)Symbol diversification of linux binaries., , , , , и . WorldCIS, стр. 74-79. IEEE, (2014)Obfuscation and Diversification for Securing Cloud Computing., , , , , и . ES, том 10131 из Lecture Notes in Computer Science, стр. 179-202. Springer, (2015)A Survey on Aims and Environments of Diversification and Obfuscation in Software Security., , , , , , и . CompSysTech, стр. 113-120. ACM, (2016)Software Security Considerations for IoT., , , , , , и . iThings/GreenCom/CPSCom/SmartData, стр. 392-397. IEEE, (2016)Diversification of System Calls in Linux Binaries., , , , , и . INTRUST, том 9473 из Lecture Notes in Computer Science, стр. 15-35. Springer, (2014)