From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems., , , , , , и . CCS, стр. 279-291. ACM, (2020)Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies., , , и . SACMAT, стр. 131-144. ACM, (2020)EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems., , , и . SmartGridComm, стр. 1-6. IEEE, (2018)Random Test Data Generation for Java Classes Annotated with JML Specifications., и . Software Engineering Research and Practice, стр. 385-391. CSREA Press, (2007)DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android., , , , и . SKM, том 1549 из Communications in Computer and Information Science, стр. 23-36. Springer, (2021)SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality., , , и . SACMAT, стр. 79-90. ACM, (2023)Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies., , , , и . EuroS&P, стр. 713-715. IEEE, (2021)Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service., , , , , , , , , и . USENIX Security Symposium, стр. 4169-4186. USENIX Association, (2021)SoK: Security of Programmable Logic Controllers., , , , и . USENIX Security Symposium, USENIX Association, (2024)Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control., , , , и . MTD@CCS, стр. 39-49. ACM, (2017)