From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting malware's failover C&C strategies with squeeze., , и . ACSAC, стр. 21-30. ACM, (2011)Prospex: Protocol Specification Extraction., , , и . SP, стр. 110-125. IEEE Computer Society, (2009)A DSP multiprocessor architecture for live camera calibration., и . WIAMIS, стр. 1-4. IEEE, (2010)EvilSeed: A Guided Approach to Finding Malicious Web Pages., , , , , и . IEEE Symposium on Security and Privacy, стр. 428-442. IEEE Computer Society, (2012)Lines of malicious code: insights into the malicious software industry., , , , и . ACSAC, стр. 349-358. ACM, (2012)Detecting Environment-Sensitive Malware., , и . RAID, том 6961 из Lecture Notes in Computer Science, стр. 338-357. Springer, (2011)A Static, Packer-Agnostic Filter to Detect Similar Malware Samples., , , , и . DIMVA, том 7591 из Lecture Notes in Computer Science, стр. 102-122. Springer, (2012)Effective and Efficient Malware Detection at the End Host., , , , , и . USENIX Security Symposium, стр. 351-366. USENIX Association, (2009)Lobotomy: An Architecture for JIT Spraying Mitigation., , , и . ARES, стр. 50-58. IEEE Computer Society, (2014)The BORG: Nanoprobing Binaries for Buffer Overreads., , , и . CODASPY, стр. 87-97. ACM, (2015)