From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Are your votes really counted?: testing the security of real-world electronic voting systems., , , , , , , и . ISSTA, стр. 237-248. ACM, (2008)HARMUR: storing and analyzing historic data on malicious domains., и . BADGERS@EuroSys, стр. 46-53. ACM, (2011)Revolver: An Automated Approach to the Detection of Evasive Web-based Malware., , , , и . USENIX Security Symposium, стр. 637-652. USENIX Association, (2013)System Security Research at Birmingham: Current Status and Some Future Work.. SysSec@DIMVA, стр. 115-118. IEEE, (2011)SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr., , , , , и . ISC, том 4176 из Lecture Notes in Computer Science, стр. 343-358. Springer, (2006)Peering through the iframe., , , и . INFOCOM, стр. 411-415. IEEE, (2011)Vulnerability Analysis of Web-based Applications., , и . Test and Analysis of Web Services, Springer, (2007)Shared lexicon for distributed annotations on the Web., и . WWW, стр. 207-214. ACM, (2005)Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners., , и . DIMVA, том 6201 из Lecture Notes in Computer Science, стр. 111-131. Springer, (2010)Static Detection of Vulnerabilities in x86 Executables., , , и . ACSAC, стр. 269-278. IEEE Computer Society, (2006)