From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Leveraging Textual Specifications for Grammar-based Fuzzing of Network Protocols., , , и . CoRR, (2018)The Thundering Herd: Amplifying Kernel Interference to Attack Response Times., , , , , и . RTAS, стр. 95-107. IEEE, (2022)One Giant Leap for Computer Security., , , , , , и . IEEE Secur. Priv., 18 (4): 8-19 (2020)Identifier Binding Attacks and Defenses in Software-Defined Networks., , , , , и . USENIX Security Symposium, стр. 415-432. USENIX Association, (2017)Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking., , , , , , и . NDSS, The Internet Society, (2020)BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems., , , , , и . RAID, том 10453 из Lecture Notes in Computer Science, стр. 311-333. Springer, (2017)How Secure and Quick is QUIC? Provable Security and Performance Analyses., , , и . IEEE Symposium on Security and Privacy, стр. 214-231. IEEE Computer Society, (2015)Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach., , , , и . NDSS, The Internet Society, (2018)Causal Analysis for Software-Defined Networking Attacks., , , , , и . USENIX Security Symposium, стр. 3183-3200. USENIX Association, (2021)Leveraging Textual Specifications for Grammar-Based Fuzzing of Network Protocols., , , и . AAAI, стр. 9478-9483. AAAI Press, (2019)