From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions, , и . CoRR, (2009)Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language., , и . RAID, том 5758 из Lecture Notes in Computer Science, стр. 81-100. Springer, (2009)Designs, Intersecting Families, and Weight of Boolean Functions.. IMACC, том 1746 из Lecture Notes in Computer Science, стр. 70-80. Springer, (1999)The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes., , и . J. Comput. Virol. Hacking Tech., 17 (3): 199-220 (2021)Optimization of Operational Large-Scale (Cyber) Attacks by a Combinational Approach., и . Int. J. Cyber Warf. Terror., 7 (3): 29-43 (2017)Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher., и . ICISSP, стр. 622-631. SciTePress, (2017)Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity., и . EUROCRYPT, том 1403 из Lecture Notes in Computer Science, стр. 475-488. Springer, (1998)Solving a Hard Instance of Suspicious Behaviour Detection with Sparse Binary Vectors Clustering., и . ICISSP, стр. 635-644. SciTePress, (2019)Structural analysis of binary executable headers for malware detection optimization., , и . J. Comput. Virol. Hacking Tech., 13 (2): 87-93 (2017)A New Ultrafast Stream Cipher Design: COS Ciphers., и . IMACC, том 2260 из Lecture Notes in Computer Science, стр. 85-98. Springer, (2001)