From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Timely Rerandomization for Mitigating Memory Disclosures., , , , и . ACM Conference on Computer and Communications Security, стр. 268-279. ACM, (2015)On the Challenges of Effective Movement., , , , и . MTD@CCS, стр. 41-50. ACM, (2014)Identifier Binding Attacks and Defenses in Software-Defined Networks., , , , , и . USENIX Security Symposium, стр. 415-432. USENIX Association, (2017)Controller-Oblivious Dynamic Access Control in Software-Defined Networks., , , , , , , , , и . DSN, стр. 447-459. IEEE, (2019)Proactive Provenance Policies for Automatic Cryptographic Data Centric Security., , , и . IPAW, том 12839 из Lecture Notes in Computer Science, стр. 71-87. Springer, (2021)QUASAR: Quantitative Attack Space Analysis and Reasoning., , , , и . ACSAC, стр. 68-78. ACM, (2017)Finding Focus in the Blur of Moving-Target Techniques., , , и . IEEE Secur. Priv., 12 (2): 16-26 (2014)Management of High-Volume Real-Time Streaming Data in Transient Environments.. University of California, Santa Cruz, USA, (2012)base-search.net (ftcdlib:qt6488m8b1).End-to-end performance management for scalable distributed storage., , , , , , , , и . PDSW, стр. 30-34. ACM Press, (2007)Mahanaxar: Quality of service guarantees in high-bandwidth, real-time streaming data storage., , , и . MSST, стр. 1-11. IEEE Computer Society, (2010)