From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware., , , , , , , , , и 1 other автор(ы). ISSTA, стр. 442-454. ACM, (2022)Fractal interpolation-based forecasting model of rumor spreading situation., , и . IMMS, стр. 195-199. ACM, (2018)UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware., , , , , , , и . USENIX Security Symposium, стр. 3421-3438. USENIX Association, (2023)MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols., , , , , , , , , и 1 other автор(ы). CoRR, (2022)MINER: A Hybrid Data-Driven Approach for REST API Fuzzing., , , , , , , , , и . USENIX Security Symposium, стр. 4517-4534. USENIX Association, (2023)MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols., , , , , , , , , и 1 other автор(ы). USENIX Security Symposium, стр. 4205-4222. USENIX Association, (2021)One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware., , , , , , , , , и 1 other автор(ы). IEEE Trans. Dependable Secur. Comput., 21 (3): 1372-1389 (мая 2024)