From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

State-of-the-Art: Security Competition in Talent Education., , , и . Inscrypt, том 10726 из Lecture Notes in Computer Science, стр. 461-481. Springer, (2017)FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities., , , , , и . USENIX Security Symposium, стр. 781-797. USENIX Association, (2018)PPIDS: A Pyramid-Like Printer Intrusion Detection System Based on ATT&CK Framework., , , , , , и . Inscrypt, том 12020 из Lecture Notes in Computer Science, стр. 277-290. Springer, (2019)MAZE: Towards Automated Heap Feng Shui., , , , , и . USENIX Security Symposium, стр. 1647-1664. USENIX Association, (2021)COMRace: Detecting Data Race Vulnerabilities in COM Objects., , , , , , и . USENIX Security Symposium, стр. 3019-3036. USENIX Association, (2022)Poster: temporal attribute-based encryption in clouds., , , , и . ACM Conference on Computer and Communications Security, стр. 881-884. ACM, (2011)HAEPG: An Automatic Multi-hop Exploitation Generation Framework., , и . DIMVA, том 12223 из Lecture Notes in Computer Science, стр. 89-109. Springer, (2020)From proof-of-concept to exploitable., , , , , и . Cybersecur., 2 (1): 12 (2019)MAAC: Novel Alert Correlation Method To Detect Multi-step Attack., , , и . CoRR, (2020)Wi-Fi Secure Access Control System Based on Geo-fence., и . ISCC, стр. 1-6. IEEE, (2019)