From post

Control Flow Obfuscation Using Neural Network to Fight Concolic Testing.

, , , , , и . SecureComm (1), том 152 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 287-304. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

LSC: Online auto-update smart contracts for fortifying blockchain-based log systems., , , , , и . Inf. Sci., (2020)Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT., , , и . Sensors, 18 (6): 1814 (2018)Secure Outsourced Attribute-Based Signatures., , , , , и . IACR Cryptology ePrint Archive, (2012)STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds., , , и . SecureComm (1), том 152 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 36-44. Springer, (2014)Full Service Hopping for Proactive Cyber-Defense., , и . ICNSC, стр. 1337-1342. IEEE, (2008)ShadowPWD: practical browser-based password manager with a security token., , , , , , , и . ACM TUR-C, стр. 30:1-30:6. ACM, (2017)Hiding Fast Flux Botnet in Plain Email Sight., , , и . ATCS/SePrIoT@SecureComm, том 239 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 182-197. Springer, (2017)Harden Tamper-Proofing to Combat MATE Attack., , , и . ICA3PP (4), том 11337 из Lecture Notes in Computer Science, стр. 98-108. Springer, (2018)New Data Publishing Framework in the Big Data Environments., , , , и . 3PGCIC, стр. 363-366. IEEE Computer Society, (2014)Message from the STPSA 2015 Workshop Organizers., и . COMPSAC Workshops, стр. 96. IEEE Computer Society, (2015)