From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Weaving Aspects in a Persistent Environment.. ACM SIGPLAN Notices, 37 (2): 36-44 (2002)Don't forget your classics: Systematizing 45 years of Ancestry for Security API Usability Recommendations., , , и . CoRR, (2021)SoK: A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools., , и . ARES, стр. 28:1-28:12. ACM, (2022)Data, Data, Everywhere: Quantifying Software Developers' Privacy Attitudes., , , и . STAST, том 11739 из Lecture Notes in Computer Science, стр. 47-65. Springer, (2019)The Internet of Insecure Cows - A Security Analysis of Wireless Smart Devices Used for Dairy Farming., , и . CPSIOTSEC@CCS, стр. 67-73. ACM, (2023)A Digital Forensic Taxonomy For Programmable Logic Controller Data Artefacts., , , и . EuroS&P Workshops, стр. 320-328. IEEE, (2023)Early Report: How to Improve Programmers' Expertise at App Security?, , и . IMPS@ESSoS, том 1575 из CEUR Workshop Proceedings, стр. 49-50. CEUR-WS.org, (2016)"Do this! Do that!, And nothing will happen" Do specifications lead to securely stored passwords?, , , и . ICSE, стр. 486-498. IEEE, (2021)Analysing The Activities Of Far-Right Extremists On The Parler Social Network., , и . ASONAM, стр. 392-399. ACM, (2023)DF-C2M2: A Capability Maturity Model for Digital Forensics Organisations., и . IEEE Symposium on Security and Privacy Workshops, стр. 57-60. IEEE Computer Society, (2014)