From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exploitation and threat analysis of open mobile devices., , , и . ANCS, стр. 20-29. ACM, (2009)Modeling Propagation Dynamics of Bluetooth Worms (Extended Version)., и . IEEE Trans. Mob. Comput., 8 (3): 353-368 (2009)Classifying Malware Represented as Control Flow Graphs using Deep Graph Convolutional Neural Network., , и . DSN, стр. 52-63. IEEE, (2019)IoTInfer: Automated Blackbox Fuzz Testing of IoT Network Protocols Guided by Finite State Machine Inference., и . IEEE Internet Things J., 9 (22): 22737-22751 (2022)CyberSim: Geographic, temporal, and organizational dynamics of malware propagation., , и . WSC, стр. 2876-2887. IEEE, (2010)SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance., , , , , , , , и . CIC, стр. 81-90. IEEE, (2019)Criticality analysis of Internet infrastructure., , , , и . Comput. Networks, 54 (7): 1169-1182 (2010)Transductive malware label propagation: Find your lineage from your neighbors., и . INFOCOM, стр. 1411-1419. IEEE, (2014)Bluetooth worm propagation: mobility pattern matters!, , , , , и . AsiaCCS, стр. 32-44. ACM, (2007)Improving Large-Scale Network Traffic Simulation with Multi-Resolution Models.. Dartmouth College, USA, (2005)