From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enhanced attack collection scheme on high-interaction web honeypots., , , и . ISCC, стр. 81-86. IEEE Computer Society, (2010)MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks., , , , и . COMPSAC, стр. 444-449. IEEE Computer Society, (2015)Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter., , , , , , , и . IEICE Trans. Inf. Syst., 107 (7): 807-824 (2024)Scalable and Performance-Efficient Client Honeypot on High Interaction System., , и . SAINT, стр. 40-50. IEEE Computer Society, (2012)An Experimental Study of Logical Office service over International ATM Networks., , , , и . LCN, стр. 530-537. IEEE Computer Society, (1997)BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts., , , , , и . TrustCom/BigDataSE/ISPA (1), стр. 758-765. IEEE, (2015)API Chaser: Anti-analysis Resistant Malware Analyzer., , , и . RAID, том 8145 из Lecture Notes in Computer Science, стр. 123-143. Springer, (2013)Active Credential Leakage for Observing Web-Based Attack Cycle., , , , и . RAID, том 8145 из Lecture Notes in Computer Science, стр. 223-243. Springer, (2013)Investigation and analysis of malware on websites., , , и . WSE, стр. 73-81. IEEE Computer Society, (2010)Safe and Secure Services Based on NGN., , , , и . IEICE Trans. Inf. Syst., 91-D (5): 1226-1233 (2008)