From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Personalized password guessing: a new security threat., , , , , и . HotSoS, стр. 22. ACM, (2014)SVAuth - A Single-Sign-On Integration Solution with Runtime Verification., , , , и . RV, том 10548 из Lecture Notes in Computer Science, стр. 349-358. Springer, (2017)CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks., , , , , , и . NSDI, стр. 667-682. USENIX Association, (2019)A framework for generation, replay, and analysis of real-world attack variants., , , и . HotSoS, стр. 28-37. ACM, (2016)Fall Prediction in People with Parkinson's Disease., и . EMBC, стр. 1502-1505. IEEE, (2022)Building Reliable and Secure Virtual Machines Using Architectural Invariants., , , , и . IEEE Secur. Priv., 12 (5): 82-85 (2014)TRACTION: an infrastructure for trusted alert sharing and collaborative mitigation., , , , , и . HotSoS, стр. 27:1-27:2. ACM, (2019)Taxonomy of Fingerprinting Techniques for Evaluation of Smart Grid Honeypot Realism., , , , , , и . SmartGridComm, стр. 1-7. IEEE, (2023)Preemptive intrusion detection: theoretical framework and real-world measurements., , , , и . HotSoS, стр. 5:1-5:12. ACM, (2015)Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants., , , , и . DSN, стр. 13-24. IEEE Computer Society, (2014)