From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multi-layer Access Control for SDN-Based Telco Clouds, , , и . Secure IT Systems, Springer, (2015)SDN-Guard: Protecting SDN Controllers Against SDN Rootkits, , , , и . Third IEEE International Workshop on Security in NFV-SDN, (2017)More than you've asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models., , , , , и . CoRR, (2023)Be the Phisher - Understanding Users' Perception of Malicious Domains., , , и . AsiaCCS, стр. 263-276. ACM, (2020)Safety, Liveness, and Information Flow: Dependability Revisited., , , , и . ARCS Workshops, том P-81 из LNI, стр. 56-65. GI, (2006)GRIMOIRE: Synthesizing Structure while Fuzzing., , , , , , и . USENIX Security Symposium, стр. 1985-2002. USENIX Association, (2019)AntiFuzz: Impeding Fuzzing Audits of Binary Executables., , , и . USENIX Security Symposium, стр. 1931-1947. USENIX Association, (2019)Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing., , , , , , , , и . USENIX Security Symposium, стр. 1239-1256. USENIX Association, (2022)Loki: Hardening Code Obfuscation Against Automated Attacks., , , , , , и . USENIX Security Symposium, стр. 3055-3073. USENIX Association, (2022)No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning., , , , , и . USENIX Security Symposium, стр. 5109-5126. USENIX Association, (2023)