From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Near-optimal trajectory planning for nonholonomic Caplygin systems., , и . IROS, стр. 1663-1668. IEEE, (1999)Development of Assist Mechanisms for Lifting Luggage Using the Lower Limbs., , , и . ICKII, стр. 764-767. IEEE, (2023)Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks., , , , и . RAID, стр. 380-394. ACM, (2022)Time-optimal motion planning of skid-steer mobile robots in the presence of obstacles., , и . IROS, стр. 32-37. IEEE, (1998)Controlling malware HTTP communications in dynamic analysis system using search engine., , , и . CSS, стр. 1-6. IEEE, (2011)Quasi-Time-Optimal Motion Planning of Mobile Platforms in the Presence of Obstacles., , и . ICRA, стр. 2958-2963. IEEE Robotics and Automation Society, (1999)Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks., , , и . ACSAC, стр. 309-318. ACM, (2012)API Chaser: Taint-Assisted Sandbox for Evasive Malware Analysis., , , и . J. Inf. Process., (2019)Stealth Loader: Trace-Free Program Loading for API Obfuscation., , , , и . RAID, том 10453 из Lecture Notes in Computer Science, стр. 217-237. Springer, (2017)Memory behavior-based automatic malware unpacking in stealth debugging environment., , и . MALWARE, стр. 39-46. IEEE Computer Society, (2010)