From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the fine-grained fingerprinting threat to software-defined networks., , , , , и . Future Gener. Comput. Syst., (2020)Mining Node.js Vulnerabilities via Object Dependence Graph and Query., , , и . USENIX Security Symposium, стр. 143-160. USENIX Association, (2022)Detecting Node.js prototype pollution vulnerabilities via object lookup analysis., , , и . ESEC/SIGSOFT FSE, стр. 268-279. ACM, (2021)An Approach to Recommendation of Verbosity Log Levels Based on Logging Intention., , , , , и . ICSME, стр. 125-134. IEEE, (2019)A Survey on Digital Forensics in Internet of Things., , , и . IEEE Internet of Things Journal, 7 (1): 1-15 (2020)A survey on internet of things security from data perspectives., , и . Comput. Networks, (2019)DTGuard: A Lightweight Defence Mechanism Against a New DoS Attack on SDN., , , , и . ICICS, том 11999 из Lecture Notes in Computer Science, стр. 503-520. Springer, (2019)Market structure and quality uncertainty: a theoretical framework for online auction research., и . Electron. Mark., 20 (1): 21-32 (2010)Towards Better Security Decisions: Applying Prospect Theory to Cybersecurity., , , , , и . CHI Extended Abstracts, ACM, (2019)Gender differences in online auctions., и . Electron. Commer. Res. Appl., (2016)