From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Guided Feature Identification and Removal for Resource-constrained Firmware., , , , и . ACM Trans. Softw. Eng. Methodol., 31 (2): 28:1-28:25 (2022)Network Security for Home IoT Devices Must Involve the User: A Position Paper., и . FPS, том 12637 из Lecture Notes in Computer Science, стр. 20-28. Springer, (2020)(Nothing But) Many Eyes Make All Bugs Shallow., , и . SCORED@CCS, стр. 53-63. ACM, (2023)Experiences in Co-designing a Packet Classification Algorithm and a Flexible Hardware Platform., , , , и . ANCS, стр. 189-199. IEEE Computer Society, (2011)Design and implementation of the PLUG architecture for programmable and efficient network lookups., , , , , , и . PACT, стр. 331-342. ACM, (2010)Kali: Scalable encryption fingerprinting in dynamic malware traces., , , , и . MALWARE, стр. 3-10. IEEE Computer Society, (2017)PLUG: flexible lookup modules for rapid deployment of new protocols in high-speed routers., , , , и . SIGCOMM, стр. 207-218. ACM, (2009)Accessibility Evaluation of IoT Android Mobile Companion Apps., , , , , , и . CHI Extended Abstracts, стр. 19:1-19:7. ACM, (2023)On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion Apps., , , , , , , и . DBSec, том 13383 из Lecture Notes in Computer Science, стр. 162-182. Springer, (2022)SpellBound: Defending Against Package Typosquatting., , , , и . CoRR, (2020)