From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis., , , , , и . IEEE Trans. Inf. Forensics Secur., 13 (7): 1838-1853 (2018)NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering., , , , , , и . ICNP, стр. 1-12. IEEE, (2019)Practical Speech Re-use Prevention in Voice-driven Services., , , , и . RAID, стр. 282-295. ACM, (2021)BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition., , , , и . WISEC, стр. 119-124. ACM, (2022)AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-De�?ned Networks, , , и . Proceedings of the 2013 ACM conference on Computer and communications security, New York, NY, USA, ACM, (2013)A Framework For Integrating Security Services into Software-Defined Networks, , , и . (2013)Bin-Carver: Automatic recovery of binary executable files., , , и . Digit. Investig., 9 (Supplement): S108-S117 (2012)Editorial: special issue on "The security, privacy, and digital forensics of mobile networks and mobile cloud"., , , и . Digit. Commun. Networks, 5 (4): 203-204 (2019)On the Privacy and Integrity Risks of Contact-Tracing Applications., , , и . CoRR, (2020)SysFlow: Toward a Programmable Zero Trust Framework for System Security., , , , , и . IEEE Trans. Inf. Forensics Secur., (2023)