From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The evidence beyond the wall: Memory forensics in SGX environments., , , , и . Digit. Investig., (2021)Google Dorks: Analysis, Creation, and New Defenses., , , и . DIMVA, том 9721 из Lecture Notes in Computer Science, стр. 255-275. Springer, (2016)Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures., , , , и . CoRR, (2018)Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing., , , и . CODASPY, стр. 231-242. ACM, (2019)The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition., , , , , , и . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 9 (1): 54-85 (2018)SnakeGX: A Sneaky Attack Against SGX Enclaves., , , и . ACNS (1), том 12726 из Lecture Notes in Computer Science, стр. 333-362. Springer, (2021)FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets., , , , , , , , и . USENIX Security Symposium, стр. 1343-1360. USENIX Association, (2023)WarpAttack: Bypassing CFI through Compiler-Introduced Double-Fetches., , , , и . SP, стр. 1271-1288. IEEE, (2023)Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures., , , , и . ACM Comput. Surv., 52 (2): 30:1-30:40 (2019)FishFuzz: Throwing Larger Nets to Catch Deeper Bugs., , , , , , , , и . CoRR, (2022)