From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Static Enforcement of Web Application Integrity Through Strong Typing., и . USENIX Security Symposium, стр. 283-298. USENIX Association, (2009)VENOMAVE: Clean-Label Poisoning Against Speech Recognition., , , , , , и . CoRR, (2020)An Experience in Testing the Security of Real-World Electronic Voting Systems., , , , , , , и . IEEE Trans. Software Eng., 36 (4): 453-473 (2010)Extending .NET security to unmanaged code., , , и . Int. J. Inf. Sec., 6 (6): 417-428 (2007)Static Disassembly and Code Analysis.. Malware Detection, том 27 из Advances in Information Security, Springer, (2007)Mnemosyne: Designing and Implementing Network Short-Term Memory, и . ICECCS '02: Proceedings of the Eighth International Conference on Engineering of Complex Computer Systems, стр. 91. Washington, DC, USA, IEEE Computer Society, (2002)Detection and Analysis of Drive-by-Download Attacks and Malicious JavaScript Code, , и . #WWW10#, (2010)Noxes: A Client-Side Solution for Mitigating Cross Site Scripting Attacks, , , и . Proceedings of the 21st ACM Symposium on Applied Computing (SAC), (2006)Towards Detecting Compromised Accounts on Social Networks., , , и . IEEE Trans. Dependable Secur. Comput., 14 (4): 447-460 (2017)Exploring Abstraction Functions in Fuzzing., , , , , и . CNS, стр. 1-9. IEEE, (2020)