From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards revealing JavaScript program intents using abstract interpretation., и . AINTEC, стр. 87-94. ACM, (2010)A Step towards Static Script Malware Abstraction: Rewriting Obfuscated Script with Maude., и . IEICE Trans. Inf. Syst., 94-D (11): 2159-2166 (2011)An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents., , , , , и . IEEE Access, (2019)A Trusted Knowledge Management System for Multi-layer Threat Analysis., , , , и . TRUST, том 8564 из Lecture Notes in Computer Science, стр. 214-215. Springer, (2014)A Survey of Smart Home IoT Device Classification Using Machine Learning-Based Network Traffic Analysis., , , и . IEEE Access, (2022)Generative Deep Learning for Internet of Things Network Traffic Generation., , , , и . PRDC, стр. 70-79. IEEE, (2020)Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service., , , , , и . ARES, стр. 47:1-47:8. ACM, (2018)Enabling secure multitenancy in cloud computing: Challenges and approaches., , , , , и . BCFIC, стр. 72-79. IEEE, (2012)ARTMAN '23: First Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks., , и . CCS, стр. 3662-3663. ACM, (2023)Interactions between artificial intelligence and cybersecurity to protect future networks., , , , и . Ann. des Télécommunications, 77 (11-12): 727-729 (2022)