From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Foray into Conficker's Logic and Rendezvous Points., и . LEET, USENIX Association, (2009)HogMap: Using SDNs to Incentivize Collaborative Security Monitoring., , , , и . SDN-NFV@CODASPY, стр. 7-12. ACM, (2016)Poster: a path-cutting approach to blocking XSS worms in social web networks., , , и . ACM Conference on Computer and Communications Security, стр. 745-748. ACM, (2011)Bootstrapping Communications into an Anti-Censorship System., , , , , , , , и . FOCI, USENIX Association, (2012)Applying Formal Evaluation to Worm Defense Design., и . IPCCC, стр. 479-486. IEEE Computer Society, (2007)Evading Censorship with Browser-Based Proxies., , , , , , и . Privacy Enhancing Technologies, том 7384 из Lecture Notes in Computer Science, стр. 239-258. Springer, (2012)Privacy-Preserving Sharing and Correlation of Security Alerts., , и . USENIX Security Symposium, стр. 239-254. USENIX, (2004)AEGIS: An Automated Permission Generation and Verification System for SDNs., , , , и . SecSoN@SIGCOMM, стр. 20-26. ACM, (2018)Rosemary: A Robust, Secure, and High-performance Network Operating System., , , , , , , , и . ACM Conference on Computer and Communications Security, стр. 78-89. ACM, (2014)GapFinder: Finding Inconsistency of Security Information From Unstructured Text., , , , и . IEEE Trans. Inf. Forensics Secur., (2021)