From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming., , , и . ESORICS (1), том 9878 из Lecture Notes in Computer Science, стр. 581-601. Springer, (2016)Offset-Aware Mutation Based Fuzzing for Buffer Overflow Vulnerabilities: Few Preliminary Results., и . ICST Workshops, стр. 531-533. IEEE Computer Society, (2011)Exniffer: Learning to Prioritize Crashes by Assessing the Exploitability from Memory Dump., , и . APSEC, стр. 239-248. IEEE Computer Society, (2017)VUzzer: Application-aware Evolutionary Fuzzing., , , , , и . NDSS, The Internet Society, (2017)Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach., , , и . ICISS, том 10063 из Lecture Notes in Computer Science, стр. 532-542. Springer, (2016)Now You See Me: Real-time Dynamic Function Call Detection., , , , и . ACSAC, стр. 618-628. ACM, (2018)A Code Centric Evaluation of C/C++ Vulnerability Datasets for Deep Learning Based Vulnerability Detection Techniques., , , и . ISEC, стр. 6:1-6:10. ACM, (2023)Discovering Vulnerable Functions: A Code Similarity Based Approach., , , и . SSCC, том 625 из Communications in Computer and Information Science, стр. 390-402. Springer, (2016)Network Intrusion Detection Using Wavelet Analysis., и . CIT, том 3356 из Lecture Notes in Computer Science, стр. 224-232. Springer, (2004)Finding Buffer Overflow Inducing Loops in Binary Executables., и . SERE, стр. 177-186. IEEE, (2012)