From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mitigating code-reuse attacks with control-flow locking., , и . ACSAC, стр. 353-362. ACM, (2011)Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention., , и . J. Parallel Distributed Comput., 66 (9): 1165-1180 (2006)CCS'12 co-located workshop summary for SPSM 2012., и . CCS, стр. 1062-1063. ACM, (2012)On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers., , , , и . AsiaCCS, стр. 61-69. ACM, (2009)Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations., , , и . ACNS, том 7341 из Lecture Notes in Computer Science, стр. 418-435. Springer, (2012)AirBag: Boosting Smartphone Resistance to Malware Infection., , , , и . NDSS, The Internet Society, (2014)vBET: a VM-based emulation testbed., и . MoMeTools@SIGCOMM, стр. 95-104. ACM, (2003)Countering Persistent Kernel Rootkits through Systematic Hook Discovery., , , и . RAID, том 5230 из Lecture Notes in Computer Science, стр. 21-38. Springer, (2008)Enabling Trusted Data-intensive execution in cloud computing., , , и . CNS, стр. 355-363. IEEE, (2014)An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems., , , , и . ISPEC, том 5451 из Lecture Notes in Computer Science, стр. 59-70. Springer, (2009)