From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tick Tock: Building Browser Red Pills from Timing Side Channels., , , и . WOOT, USENIX Association, (2014)Ad Injection at Scale: Assessing Deceptive Advertisement Modifications., , , , , , , , , и 2 other автор(ы). IEEE Symposium on Security and Privacy, стр. 151-167. IEEE Computer Society, (2015)Hopper: Modeling and Detecting Lateral Movement., , , , , , и . USENIX Security Symposium, стр. 3093-3110. USENIX Association, (2021)Improved lost frame recovery techniques for ITU-T G.723.1 speech coding system., , и . EUSIPCO, стр. 1-4. IEEE, (1998)Unfiltered: Measuring Cloud-based Email Filtering Bypasses., , , , и . WWW, стр. 1702-1711. ACM, (2024)Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender., , , , , , и . SOUPS, стр. 77-95. USENIX Association, (2023)Thwarting Sophisticated Enterprise Attacks: Data-Driven Methods and Insights.. University of California, Berkeley, USA, (2020)Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension., , , , , , , и . WWW, стр. 1009-1019. ACM, (2016)Hopper: Modeling and Detecting Lateral Movement (Extended Report)., , , , , , и . CoRR, (2021)An Empirical Analysis of Enterprise-Wide Mandatory Password Updates., , , и . ACSAC, стр. 150-162. ACM, (2023)