From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions., , и . AsiaCCS, стр. 793-795. ACM, (2018)Domain name system security and privacy: A contemporary survey., , , , , и . Comput. Networks, (2021)Measuring the Cost of Software Vulnerabilities., , , , , , и . EAI Endorsed Trans. Security Safety, 7 (23): e1 (2020)Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach., , , , , , и . CoRR, (2019)ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation., , , , , , , , и . IEEE Internet Things J., 9 (4): 2485-2496 (2022)Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses., , , , и . CoRR, (2020)RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing., , , , , и . IEEE ICBC, стр. 210-218. IEEE, (2019)Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach., , , , , , , , и . IEEE Internet of Things Journal, 6 (5): 8977-8988 (2019)Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts., , , , , , , , , и . CoRR, (2021)Systemically Evaluating the Robustness of ML-based IoT Malware Detectors., , , , , , и . DSN (Supplements), стр. 3-4. IEEE, (2021)