From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Foray into Conficker's Logic and Rendezvous Points., и . LEET, USENIX Association, (2009)Bootstrapping Communications into an Anti-Censorship System., , , , , , , , и . FOCI, USENIX Association, (2012)Poster: a path-cutting approach to blocking XSS worms in social web networks., , , и . ACM Conference on Computer and Communications Security, стр. 745-748. ACM, (2011)Privacy-Preserving Sharing and Correlation of Security Alerts., , и . USENIX Security Symposium, стр. 239-254. USENIX, (2004)Evading Censorship with Browser-Based Proxies., , , , , , и . Privacy Enhancing Technologies, том 7384 из Lecture Notes in Computer Science, стр. 239-258. Springer, (2012)Applying Formal Evaluation to Worm Defense Design., и . IPCCC, стр. 479-486. IEEE Computer Society, (2007)AEGIS: An Automated Permission Generation and Verification System for SDNs., , , , и . SecSoN@SIGCOMM, стр. 20-26. ACM, (2018)5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service., , , , и . NDSS, The Internet Society, (2024)HogMap: Using SDNs to Incentivize Collaborative Security Monitoring., , , , и . SDN-NFV@CODASPY, стр. 7-12. ACM, (2016)Inside risks - Reflections on Conficker.. Commun. ACM, 52 (10): 23-24 (2009)