From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scalability, fidelity, and containment in the potemkin virtual honeyfarm., , , , , , , и . SOSP, стр. 148-162. ACM, (2005)Self-stopping worms., , и . WORM, стр. 12-21. ACM Press, (2005)Difference engine: harnessing memory redundancy in virtual machines., , , , , , , и . Commun. ACM, 53 (10): 85-93 (2010)Judging a site by its content: learning the textual, structural, and visual features of malicious web pages., , и . AISec, стр. 1-10. ACM, (2011)Web feature deprecation: a case study for chrome., , , , , и . ICSE (SEIP), стр. 302-311. IEEE / ACM, (2019)Who is .com?: Learning to Parse WHOIS Records., , , , и . Internet Measurement Conference, стр. 369-380. ACM, (2015)On the empirical performance of self-calibrating WiFi location systems., , и . LCN, стр. 76-84. IEEE Computer Society, (2011)Got traffic?: an evaluation of click traffic providers., , , и . WebQuality@WWW, стр. 19-26. ACM, (2011)You've Got Vulnerability: Exploring Effective Vulnerability Notifications., , , , , , , и . USENIX Security Symposium, стр. 1033-1050. USENIX Association, (2016)Hopper: Modeling and Detecting Lateral Movement., , , , , , и . USENIX Security Symposium, стр. 3093-3110. USENIX Association, (2021)