From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improving Signature Testing through Dynamic Data Flow Analysis., , , и . ACSAC, стр. 53-63. IEEE Computer Society, (2007)Detecting social cliques for automated privacy control in online social networks., и . PerCom Workshops, стр. 353-359. IEEE Computer Society, (2012)EvilSeed: A Guided Approach to Finding Malicious Web Pages., , , , , и . IEEE Symposium on Security and Privacy, стр. 428-442. IEEE Computer Society, (2012)deDacota: toward preventing server-side XSS via automatic code and data separation., , , , , и . ACM Conference on Computer and Communications Security, стр. 1205-1216. ACM, (2013)Fear the EAR: discovering and mitigating execution after redirect vulnerabilities., , , и . ACM Conference on Computer and Communications Security, стр. 251-262. ACM, (2011)TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems., , , , , , и . CNS, стр. 1-9. IEEE, (2020)Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance., , , , , , и . CCS, стр. 347-362. ACM, (2017)Dirty Clicks: A Study of the Usability and Security Implications of Click-related Behaviors on the Web., , , , и . WWW, стр. 395-406. ACM / IW3C2, (2020)Demystifying NFT Promotion and Phishing Scams., , , , , и . CoRR, (2023)Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing., , , , , , , , и . USENIX Security Symposium, стр. 1239-1256. USENIX Association, (2022)