From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hit 'em where it hurts: a live security exercise on cyber situational awareness., , , , , , , и . ACSAC, стр. 51-61. ACM, (2011)CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms., , , и . SAC, стр. 1865-1870. ACM, (2010)Taxonomist: Application Detection Through Rich Monitoring Data., , , , , , и . Euro-Par, том 11014 из Lecture Notes in Computer Science, стр. 92-105. Springer, (2018)Using Static Program Analysis to Aid Intrusion Detection., , , и . DIMVA, том 4064 из Lecture Notes in Computer Science, стр. 17-36. Springer, (2006)Nile: A Programmable Monitoring Coprocessor., , , , и . IEEE Comput. Archit. Lett., 17 (1): 92-95 (2018)Proctor: A Semi-Supervised Performance Anomaly Diagnosis Framework for Production HPC Systems., , , , , , , , и . ISC, том 12728 из Lecture Notes in Computer Science, стр. 195-214. Springer, (2021)SIGFuzz: A Framework for Discovering Microarchitectural Timing Side Channels., , , и . DATE, стр. 1-6. IEEE, (2023)HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing., , , , , , и . NDSS, The Internet Society, (2020)COMPA: Detecting Compromised Accounts on Social Networks., , , и . NDSS, The Internet Society, (2013)No Grammar, No Problem: Towards Fuzzing the Linux Kernel without System-Call Descriptions., , , и . NDSS, The Internet Society, (2023)