From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Converting an Electric Power Utility Network to Defend Against Crafted Inputs., , , , и . Critical Infrastructure Protection, том 570 из IFIP Advances in Information and Communication Technology, стр. 73-85. Springer, (2019)The cake is a lie: privilege rings as a policy resource., , , , и . VMSec@CCS, стр. 33-38. ACM, (2009)Hands-on cybersecurity exercises and the rave virtual environment (abstract only)., , , , и . SIGCSE, стр. 759. ACM, (2013)Finding the Balance Between Guidance and Independence in Cybersecurity Exercises., , , , и . ASE @ USENIX Security Symposium, USENIX Association, (2016)Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems., , , , и . Critical Infrastructure Protection, том 367 из IFIP Advances in Information and Communication Technology, стр. 31-46. Springer, (2011)Quantifying Application Behavior Space for Detection and Self-Healing, , , , и . CUCS-017-06. Columbia University, (2006)FLIPS: Hybrid Adaptive Intrustion Prevention, , , и . #RAID05#, (2005)SSARES: Secure Searchable Automated Remote Email Storage., , , и . ACSAC, стр. 129-139. IEEE Computer Society, (2007)Weird Machines in Package Managers: A Case Study of Input Language Complexity and Emergent Execution in Software Systems., , и . SP (Workshops), стр. 169-179. IEEE, (2024)Katana: A Hot Patching Framework for ELF Executables., , , и . ARES, стр. 507-512. IEEE Computer Society, (2010)