From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems., , и . CAV, том 8044 из Lecture Notes in Computer Science, стр. 724-739. Springer, (2013)Formal Black-Box Analysis of Routing Protocol Implementations., , и . CoRR, (2017)Maximizing Restorable Throughput in MPLS Networks., и . INFOCOM, стр. 2324-2332. IEEE, (2008)Gyrophone: Recognizing Speech from Gyroscope Signals., , и . USENIX Security Symposium, стр. 1053-1067. USENIX Association, (2014)OSS: Using Online Scanning Services for Censorship Circumvention., , и . Privacy Enhancing Technologies, том 7981 из Lecture Notes in Computer Science, стр. 185-204. Springer, (2013)Topology-Agnostic Runtime Detection of OSPF Routing Attacks., , , и . CNS, стр. 277-285. IEEE, (2019)Network-based intrusion detection systems go active!, , и . CCS, стр. 1004-1006. ACM, (2012)Routing Loop Attacks using IPv6 Tunnels., и . WOOT, стр. 1-7. USENIX Association, (2009)Analyzing Internet Routing Security Using Model Checking., , и . LPAR, том 9450 из Lecture Notes in Computer Science, стр. 112-129. Springer, (2015)On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing., и . INFOCOM, IEEE, (2004)