From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS., , и . ICISS, том 7093 из Lecture Notes in Computer Science, стр. 322-336. Springer, (2011)Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution., и . Moving Target Defense, том 54 из Advances in Information Security, Springer, (2011)Hands-Free One-Time and Continuous Authentication Using Glass Wearable Devices., и . CoRR, (2018)The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines., , , , и . NDSS, The Internet Society, (2015)Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard., , , , и . USENIX Security Symposium, стр. 417-432. USENIX Association, (2014)The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones., , и . EUROSEC, стр. 6:1-6:6. ACM, (2014)ShrinkWrap: VTable Protection without Loose Ends., , , , и . ACSAC, стр. 341-350. ACM, (2015)Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking., , и . IWSEC, том 7038 из Lecture Notes in Computer Science, стр. 113-128. Springer, (2011)Detecting Traffic Snooping in Tor Using Decoys., , , и . RAID, том 6961 из Lecture Notes in Computer Science, стр. 222-241. Springer, (2011)Adaptive defenses for commodity software through virtual application partitioning., , , и . CCS, стр. 133-144. ACM, (2012)