From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multi-layer Access Control for SDN-Based Telco Clouds, , , и . Secure IT Systems, Springer, (2015)SDN-Guard: Protecting SDN Controllers Against SDN Rootkits, , , , и . Third IEEE International Workshop on Security in NFV-SDN, (2017)Static Detection of Uninitialized Stack Variables in Binary Code., , , и . CoRR, (2020)EvilCoder: Automated Bug Insertion., и . CoRR, (2020)VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching., , , , , , и . CoRR, (2020)Advanced Honeypot-Based Intrusion Detection., , и . login Usenix Mag., (2006)Be the Phisher - Understanding Users' Perception of Malicious Domains., , , и . AsiaCCS, стр. 263-276. ACM, (2020)GRIMOIRE: Synthesizing Structure while Fuzzing., , , , , , и . USENIX Security Symposium, стр. 1985-2002. USENIX Association, (2019)AntiFuzz: Impeding Fuzzing Audits of Binary Executables., , , и . USENIX Security Symposium, стр. 1931-1947. USENIX Association, (2019)NAUTILUS: Fishing for Deep Bugs with Grammars., , , , , и . NDSS, The Internet Society, (2019)