From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fighting botnets with sinkholes.. Netw. Secur., 2012 (8): 12-15 (2012)Hands-on with Metasploit Express.. Netw. Secur., 2010 (7): 7-11 (2010)Offensive defence.. Netw. Secur., 2013 (7): 9-12 (2013)Testing the defences of bulletproof hosting companies.. Netw. Secur., 2014 (6): 8-12 (2014)A hole in the security wall: ATM hacking.. Netw. Secur., 2010 (6): 12-15 (2010)Routing around censorship.. Netw. Secur., 2011 (5): 5-8 (2011)The metamorphosis of malware writers.. Comput. Secur., 25 (2): 89-90 (2006)Modeling network security.. Comput. Secur., 25 (3): 163-164 (2006)Going, going, gone.. Digital Investigation, 3 (3): 112-114 (2006)Avoiding URL hell.. Netw. Secur., 2010 (11): 4-6 (2010)