From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Architecture for Generating Semantics-Aware Signatures, , , и . #SEC05#, (2005)Automatic Discovery of Parasitic Malware., и . RAID, том 6307 из Lecture Notes in Computer Science, стр. 97-117. Springer, (2010)A Declarative Framework for Intrusion Analysis., , , и . Cyber Situational Awareness, том 46 из Advances in Information Security, Springer, (2010)Automated remote repair for mobile malware., , и . ACSAC, стр. 413-422. ACM, (2011)An Architecture for Generating Semantic Aware Signatures., , , и . USENIX Security Symposium, USENIX Association, (2005)End-to-End Software Diversification of Internet Services., , , и . Moving Target Defense, том 54 из Advances in Information Security, Springer, (2011)Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections., и . RAID, том 5230 из Lecture Notes in Computer Science, стр. 39-58. Springer, (2008)System Call API Obfuscation (Extended Abstract)., , и . RAID, том 5230 из Lecture Notes in Computer Science, стр. 421-422. Springer, (2008)Strengthening Software Self-Checksumming via Self-Modifying Code., , и . ACSAC, стр. 23-32. IEEE Computer Society, (2005)Detecting Manipulated Remote Call Streams., , и . USENIX Security Symposium, стр. 61-79. USENIX, (2002)