From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis., , , , , , , , , и 3 other автор(ы). EuroS&P, стр. 560-575. IEEE, (2019)Toward Exposing Timing-Based Probing Attacks in Web Applications., , , , и . Sensors, 17 (3): 464 (2017)Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning., , , , , и . Comput. Secur., (2015)PRO-ORAM: Practical Read-Only Oblivious RAM., , и . RAID, стр. 197-211. USENIX Association, (2019)Detecting injected behaviors in HTML5-based Android applications., , , и . J. High Speed Networks, 22 (1): 15-34 (2016)Robust P2P Primitives Using SGX Enclaves., , , , , и . ICDCS, стр. 1185-1186. IEEE, (2020)Toward Exposing Timing-Based Probing Attacks in Web Applications., , , , и . WASA, том 9798 из Lecture Notes in Computer Science, стр. 499-510. Springer, (2016)A Function-Level Behavior Model for Anomalous Behavior Detection in Hybrid Mobile Applications., , , , , и . IIKI, стр. 497-505. IEEE Computer Society, (2016)Robust Detection of Android UI Similarity., , , , , и . ICC, стр. 1-6. IEEE, (2018)Automatic permission inference for hybrid mobile apps., , , , и . J. High Speed Networks, 22 (1): 55-64 (2016)