From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems., , , , , , и . CNS, стр. 1-9. IEEE, (2020)Fear the EAR: discovering and mitigating execution after redirect vulnerabilities., , , и . ACM Conference on Computer and Communications Security, стр. 251-262. ACM, (2011)deDacota: toward preventing server-side XSS via automatic code and data separation., , , , , и . ACM Conference on Computer and Communications Security, стр. 1205-1216. ACM, (2013)Escape from Monkey Island: Evading High-Interaction Honeyclients., , , и . DIMVA, том 6739 из Lecture Notes in Computer Science, стр. 124-143. Springer, (2011)Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis., , , , и . WWW, стр. 3108-3115. ACM, (2019)EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services., , , , , и . USENIX Security Symposium, стр. 563-578. USENIX Association, (2015)BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients., , , и . ICCCN, стр. 1-6. IEEE, (2011)Towards Detecting Compromised Accounts on Social Networks., , , и . CoRR, (2015)Precise alias analysis for static detection of web application vulnerabilities., , и . PLAS, стр. 27-36. ACM, (2006)Using Loops For Malware Classification Resilient to Feature-unaware Perturbations., , , , , , и . ACSAC, стр. 112-123. ACM, (2018)