From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Meaning of Attack-Resistant Programs., , и . CoRR, (2015)Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection., , и . ACM Trans. Priv. Secur., 24 (4): 25:1-25:35 (2021)StIns4CS: A State Inspection Tool for C#., и . SPRO@CCS, стр. 61-71. ACM, (2016)Reasoning about Probabilistic Defense Mechanisms against Remote Attacks., , , , и . EuroS&P, стр. 499-513. IEEE, (2017)Don't Pick the Cherry: An Evaluation Methodology for Android Malware Detection Methods., , и . CoRR, (2019)Multipliers for floating-point double precision and beyond on FPGAs., , , и . SIGARCH Comput. Archit. News, 38 (4): 73-79 (2010)VOT4CS: A Virtualization Obfuscation Tool for C#., , , и . SPRO@CCS, стр. 39-49. ACM, (2016)Measuring Privacy Compliance with Process Specifications., и . Metrisec@ESEM, стр. 41-50. IEEE, (2011)A framework for empirical evaluation of malware detection resilience against behavior obfuscation., , , , , и . MALWARE, стр. 40-47. IEEE Computer Society, (2015)Idea: Benchmarking Indistinguishability Obfuscation - A Candidate Implementation., , , и . ESSoS, том 8978 из Lecture Notes in Computer Science, стр. 149-156. Springer, (2015)