From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Stealth Loader: Trace-Free Program Loading for API Obfuscation., , , , и . RAID, том 10453 из Lecture Notes in Computer Science, стр. 217-237. Springer, (2017)Analyzing the Use of Public and In-house Secure Development Guidelines in U.S. and Japanese Industries., , , и . CHI, стр. 187:1-187:17. ACM, (2023)Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks., , , и . ACSAC, стр. 309-318. ACM, (2012)API Chaser: Taint-Assisted Sandbox for Evasive Malware Analysis., , , и . J. Inf. Process., (2019)Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services., , , , и . J. Inf. Process., (2020)API Chaser: Anti-analysis Resistant Malware Analyzer., , , и . RAID, том 8145 из Lecture Notes in Computer Science, стр. 123-143. Springer, (2013)A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects., , , и . ACSAC, стр. 349-364. ACM, (2021)Understanding the security management of global third-party Android marketplaces., , , , , , , , и . WAMA@ESEC/SIGSOFT FSE, стр. 12-18. ACM, (2017)I know what you did last login: inconsistent messages tell existence of a target's account to insiders., , , и . ACSAC, стр. 732-746. ACM, (2019)Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (11): 2026-2033 (2010)