From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hooking Graceful Moments: A Security Analysis of Sudo Session Handling., , , и . IWSEC, том 9836 из Lecture Notes in Computer Science, стр. 41-60. Springer, (2016)Working Towards a Primary Binary Analysis System., , , , и . Security and Management, стр. 459-465. CSREA Press, (2010)Pilot Study for Assessing the Behaviors of Patients with Schizophrenia towards a Virtual Avatar., , , , , , , , и . Cyberpsy., Behavior, and Soc. Networking, 9 (5): 531-539 (2006)TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote., , , и . IEICE Trans. Inf. Syst., 91-D (5): 1338-1347 (2008)Virtual reality prototype for measurement of expression characteristics in emotional situations., , , , , , , , , и . Comput. Biol. Medicine, 39 (2): 173-179 (2009)An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation., , , , , , , , и . IEICE Trans. Inf. Syst., 94-D (9): 1778-1791 (2011)How to Locate a Target Binary Process and Its Derivatives in System Emulator., , , , и . SAINT, стр. 273-276. IEEE Computer Society, (2010)Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage., , , , и . CCS, стр. 131-145. ACM, (2018)A Heuristic-Based Feature Selection Method for Clustering Spam Emails., , , , и . ICONIP (1), том 6443 из Lecture Notes in Computer Science, стр. 290-297. Springer, (2010)Capturing Information Flow with Concatenated Dynamic Taint Analysis., , , и . ARES, стр. 355-362. IEEE Computer Society, (2009)