From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Leveraging Textual Specifications for Grammar-based Fuzzing of Network Protocols., , , и . CoRR, (2018)Datagram Convergence Layers for the Delay- and Disruption-Tolerant Networking (DTN) Bundle Protocol and Licklider Transmission Protocol (LTP)., , и . RFC, (марта 2014)The Thundering Herd: Amplifying Kernel Interference to Attack Response Times., , , , , и . RTAS, стр. 95-107. IEEE, (2022)Identifier Binding Attacks and Defenses in Software-Defined Networks., , , , , и . USENIX Security Symposium, стр. 415-432. USENIX Association, (2017)Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking., , , , , , и . NDSS, The Internet Society, (2020)BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems., , , , , и . RAID, том 10453 из Lecture Notes in Computer Science, стр. 311-333. Springer, (2017)TAG: Tagged Architecture Guide., , , , , , и . ACM Comput. Surv., 55 (6): 124:1-124:34 (2023)One Giant Leap for Computer Security., , , , , , и . IEEE Secur. Priv., 18 (4): 8-19 (2020)How Secure and Quick is QUIC? Provable Security and Performance Analyses., , , и . IEEE Symposium on Security and Privacy, стр. 214-231. IEEE Computer Society, (2015)Leveraging Textual Specifications for Grammar-Based Fuzzing of Network Protocols., , , и . AAAI, стр. 9478-9483. AAAI Press, (2019)