From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting Kernel Control-Flow Modifying Rootkits., и . Network Science and Cybersecurity, том 55 из Advances in Information Security, Springer, (2014)Repeatability of Inertial Measurement Units for Measuring Pelvic Mobility in Patients Undergoing Total Hip Arthroplasty., , , , , , , , и . Sensors, 23 (1): 377 (2023)Malicious Firmware Detection with Hardware Performance Counters., , , , , , , и . IEEE Trans. Multi Scale Comput. Syst., 2 (3): 160-173 (2016)Indoor positioning system based on improved PDR and magnetic calibration using smartphone., , , , , и . PIMRC, стр. 2099-2103. IEEE, (2014)Score-Aligned Polyphonic Microtiming Estimation., , , и . ICASSP, стр. 361-365. IEEE, (2018)Application of ant colony optimized routing algorithm based on evolving graph model in VANETs., , , и . WPMC, стр. 265-270. IEEE, (2014)Angle Jungle: An Educational Game about Angles., , , , , , и . CHI PLAY (Companion), стр. 633-638. ACM, (2017)Size dependent electronic properties of silicon quantum dots - An analysis with hybrid, screened hybrid and local density functional theory., , , , , и . Comput. Phys. Commun., (2017)MAGIC: Malicious Aging in Circuits/Cores., , , , и . ACM Trans. Archit. Code Optim., 12 (1): 5:1-5:25 (2015)Reusing Hardware Performance Counters to Detect and Identify Kernel Control-Flow Modifying Rootkits., и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 35 (3): 485-498 (2016)