From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Melt inclusion evidence for magma evolution at Mutnovsky volcano, Kamchatka, , , , , , , и . Geofluids, 13 (4): 421--439 (2013)Polymorphic Worm Detection Using Structural Information of Executables., , , , и . RAID, том 3858 из Lecture Notes in Computer Science, стр. 207-226. Springer, (2005)Distinctive epigenomes characterize glioma stem cells and their response to differentiation cues, , , , , , , , , и 1 other автор(ы). Genome Biol, 19 (1): 43-43 (марта 2018)Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions., , и . CoRR, (2018)Evaluating Synthetic Bugs., , , , и . CoRR, (2022)Black-box Attacks Against Neural Binary Function Detection., , , , и . RAID, стр. 1-16. ACM, (2023)EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails., , , , и . COMPSAC, стр. 408-416. IEEE Computer Society, (2016)Evaluation of the Gen-Probe PACE II assay for the direct detection of Neisseria gonorrhoeae in endocervical specimens, , и . Diagnostic Microbiology and Infectious Disease, 15 (8): 645--649 (декабря 1992)PMID: 1282447.Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists., , , , и . ISC, том 11723 из Lecture Notes in Computer Science, стр. 255-276. Springer, (2019)Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries., , , , , и . J. Comput. Secur., 17 (3): 305-329 (2009)