From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting the Deviations of Privileged Process Execution., , , и . ICN (2), том 3421 из Lecture Notes in Computer Science, стр. 980-988. Springer, (2005)Regular balanced Cayley maps on nonabelian metacyclic groups of odd order., , и . Art Discret. Appl. Math., (2020)On the Security of Secure Server-Designation Public Key Encryption with Keyword Search., , , и . Comput. J., 61 (12): 1791-1793 (2018)OTA: An Operation-oriented Time Allocation Strategy for Greybox Fuzzing., , , , и . SANER, стр. 108-118. IEEE, (2021)AcoFuzz: Adaptive Energy Allocation for Greybox Fuzzing., , , и . ICST Workshops, стр. 269-276. IEEE, (2022)Spatial Data Publication Under Local Differential Privacy., , , , , и . WISA, том 13579 из Lecture Notes in Computer Science, стр. 627-637. Springer, (2022)Exploiting Temperature-Varied ECU Fingerprints for Source Identification in In-vehicle Network Intrusion Detection., , , , , и . IPCCC, стр. 1-8. IEEE, (2019)SLFAT: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames., , , и . Secur. Commun. Networks, (2019)AFLTurbo: Speed up Path Discovery for Greybox Fuzzing., , , и . ISSRE, стр. 81-91. IEEE, (2020)LoadLord: Loading on the Fly to Defend Against Code-Reuse Attacks., , , и . CoRR, (2023)