From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies., , , , и . ACM Trans. Priv. Secur., 26 (4): 45:1-45:35 (ноября 2023)Behavioral Intrusion Detection.. ISCIS, том 3280 из Lecture Notes in Computer Science, стр. 657-666. Springer, (2004)A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives., , , , и . ACSAC, стр. 269-278. ACM, (2013)Security and Trust in the Italian Legal Digital Signature Framework.. iTrust, том 3477 из Lecture Notes in Computer Science, стр. 34-44. Springer, (2005)CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks., , , , и . CCS, стр. 711-723. ACM, (2022)Effective Multimodel Anomaly Detection Using Cooperative Negotiation., , и . GameSec, том 6442 из Lecture Notes in Computer Science, стр. 180-191. Springer, (2010)Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication., , , , , , , и . CCS, стр. 501-512. ACM, (2014)Systems Security Research at Politecnico di Milano., и . SysSec@DIMVA, стр. 127-130. IEEE, (2011)Measuring and Defeating Anti-Instrumentation-Equipped Malware., , , , , , и . DIMVA, том 10327 из Lecture Notes in Computer Science, стр. 73-96. Springer, (2017)A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks., , , и . DIMVA, том 10327 из Lecture Notes in Computer Science, стр. 185-206. Springer, (2017)