From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

From Text to MITRE Techniques: Exploring the Malicious Use of Large Language Models for Generating Cyber Attack Payloads., , , и . CoRR, (2023)Typing abstractions and management in a component framework., , и . ASP-DAC, стр. 115-122. ACM, (2003)Ransomware Detection based on Network Behavior using Machine Learning and Hidden Markov Model with Gaussian Emission., , , и . CSR, стр. 227-233. IEEE, (2023)Malware Detection in Word Documents Using Machine Learning., , , и . ACeS, том 1347 из Communications in Computer and Information Science, стр. 325-339. Springer, (2020)Translating concurrent action oriented specifications to synchronous guarded actions., , и . LCTES, стр. 47-56. ACM, (2010)Guest Editors' Introduction: Challenges for Reliable Design at the Nanoscale., , , и . IEEE Des. Test Comput., 22 (4): 295-297 (2005)An Insecurity Study of Ethereum Smart Contracts., , , и . SPACE, том 12586 из Lecture Notes in Computer Science, стр. 188-207. Springer, (2020)APECS code synthesis: Extending ocarina for multi-threaded code synthesis from AADL models for Safety Critical applications., и . ICNSC, стр. 36-41. IEEE, (2014)Hardware optimizations for crypto implementations (Invited paper)., и . VDAT, стр. 1-6. IEEE, (2016)The challenge of interoperability: model-based integration for automotive control software., , , , и . DAC, стр. 58:1-58:6. ACM, (2015)