From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

RansomLens: Understanding Ransomware via Causality Analysis on System Provenance Graph., , и . SciSec, том 13005 из Lecture Notes in Computer Science, стр. 252-267. Springer, (2021)Correlated Status Update of Energy Harvesting Sensors Based on Reinforcement Learning., и . WCSP, стр. 1-5. IEEE, (2021)A dynamic generalized coherence factor for side lobe suppression in ultrasound imaging., , , , и . Comput. Biol. Medicine, (2020)Quantitatively Measure Access Control Mechanisms across Different Operating Systems., , и . SERE, стр. 50-59. IEEE, (2013)Operating System Security Policy Hardening via Capability Dependency Graphs., , , и . ISPEC, том 9065 из Lecture Notes in Computer Science, стр. 3-17. Springer, (2015)Explainable APT Attribution for Malware Using NLP Techniques., , и . QRS, стр. 70-80. IEEE, (2021)Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones., , , , , и . TrustCom, стр. 432-439. IEEE Computer Society, (2014)Evaluating and comparing the quality of access control in different operating systems., , , , , и . Comput. Secur., (2014)CTSCOPY: Hunting Cyber Threats within Enterprise via Provenance Graph-based Analysis., , , и . QRS, стр. 28-39. IEEE, (2021)APT Attribution for Malware Based on Time Series Shapelets., , , , , и . TrustCom, стр. 769-777. IEEE, (2022)