From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Empirical Research and Research Ethics in Information Security., , и . ICISSP (Revised Selected Papers), том 691 из Communications in Computer and Information Science, стр. 14-22. Springer, (2016)Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications., , , , , , и . NDSS, The Internet Society, (2012)Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source Code., , , , и . SECRYPT, стр. 7-19. SCITEPRESS, (2023)SoK: Automatic Deobfuscation of Virtualization-protected Applications., , , , и . ARES, стр. 6:1-6:15. ACM, (2021)Poster: Design of an Anomaly-based Threat Detection & Explication System., , , , и . SACMAT, стр. 119-120. ACM, (2017)Code Obfuscation against Static and Dynamic Reverse Engineering., и . Information Hiding, том 6958 из Lecture Notes in Computer Science, стр. 270-284. Springer, (2011)Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space., , , , и . USENIX Security Symposium, USENIX Association, (2011)Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process., , , , и . ICISSP, стр. 211-218. SCITEPRESS, (2024)InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles., , , , и . Sicherheit, том P-228 из LNI, стр. 363-374. GI, (2014)What's new with WhatsApp & Co.? Revisiting the Security of Smartphone Messaging Applications., , , , и . iiWAS, стр. 142-151. ACM, (2014)