From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards Least Privilege Containers with Cimplifier., , , , и . CoRR, (2016)Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques., , , , и . Neural Comput. Appl., 34 (14): 12077-12096 (2022)Guided Feature Identification and Removal for Resource-constrained Firmware., , , , и . ACM Trans. Softw. Eng. Methodol., 31 (2): 28:1-28:25 (2022)Network Security for Home IoT Devices Must Involve the User: A Position Paper., и . FPS, том 12637 из Lecture Notes in Computer Science, стр. 20-28. Springer, (2020)(Nothing But) Many Eyes Make All Bugs Shallow., , и . SCORED@CCS, стр. 53-63. ACM, (2023)Experiences in Co-designing a Packet Classification Algorithm and a Flexible Hardware Platform., , , , и . ANCS, стр. 189-199. IEEE Computer Society, (2011)Design and implementation of the PLUG architecture for programmable and efficient network lookups., , , , , , и . PACT, стр. 331-342. ACM, (2010)Kali: Scalable encryption fingerprinting in dynamic malware traces., , , , и . MALWARE, стр. 3-10. IEEE Computer Society, (2017)Reliable Detection of Compressed and Encrypted Data., , , , и . CoRR, (2021)Security Issues in Language-based Sofware Ecosystems., , , и . CoRR, (2019)