From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A heuristic approach to author name disambiguation in bibliometrics databases for large-scale research assessments., , и . J. Assoc. Inf. Sci. Technol., 62 (2): 257-269 (2011)Don't Look UB: Exposing Sanitizer-Eliding Compiler Optimizations., , , , и . Proc. ACM Program. Lang., 7 (PLDI): 907-927 (2023)No Need to Hide: Protecting Safe Regions on Commodity Hardware., , , , и . EuroSys, стр. 437-452. ACM, (2017)I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics., , , и . DIMVA, том 8550 из Lecture Notes in Computer Science, стр. 92-111. Springer, (2014)Slick: an intrusion detection system for virtualized storage devices., , , и . SAC, стр. 2033-2040. ACM, (2016)Enviral: Fuzzing the Environment for Evasive Malware Analysis., , и . EuroSec@EUROSYS, стр. 8-14. ACM, (2023)Techniques for efficient in-memory checkpointing., , , и . HotDep, стр. 12:1-12:5. ACM, (2013)EDFI: A Dependable Fault Injection Tool for Dependability Benchmarking Experiments., , и . PRDC, стр. 31-40. IEEE Computer Society, (2013)Secure and Efficient Multi-Variant Execution Using Hardware-Assisted Process Virtualization., , и . DSN, стр. 431-442. IEEE Computer Society, (2016)Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization., , и . USENIX Security Symposium, стр. 475-490. USENIX Association, (2012)