From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Comparative analysis of neural networks techniques to forecast Airfare Prices., , , , и . COMPSAC, стр. 1023-1029. IEEE, (2023)Remotely Assessing Integrity of Software Applications by Monitoring Invariants: Present Limitations and Future Directions., , и . CRiSIS, том 10694 из Lecture Notes in Computer Science, стр. 66-82. Springer, (2017)Assessment of Source Code Obfuscation Techniques., , , , , , и . SCAM, стр. 11-20. IEEE Computer Society, (2016)Assessment of Source Code Obfuscation Techniques., , , , , , и . CoRR, (2017)Ethical issues of ISPs in the modern web., , , и . CoRR, (2017)On the impossibility of effectively using likely-invariants for software attestation purposes., , , и . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 9 (2): 1-25 (2018)Empirical assessment of the effort needed to attack programs protected with client/server code splitting., , , , , и . Empir. Softw. Eng., 25 (1): 1-48 (2020)Software Attestation with Static and Dynamic Techniques.. Polytechnic University of Turin, Italy, (2019)Estimating Software Obfuscation Potency with Artificial Neural Networks., , , и . STM, том 10547 из Lecture Notes in Computer Science, стр. 193-202. Springer, (2017)Towards Automatic Risk Analysis and Mitigation of Software Applications., , , , и . WISTP, том 9895 из Lecture Notes in Computer Science, стр. 120-135. Springer, (2016)