From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Behavioral Distance for Intrusion Detection., , и . RAID, том 3858 из Lecture Notes in Computer Science, стр. 63-81. Springer, (2005)Behavioral Distance Measurement Using Hidden Markov Models., , и . RAID, том 4219 из Lecture Notes in Computer Science, стр. 19-40. Springer, (2006)Fighting Coercion Attacks in Key Generation using Skin Conductance., и . USENIX Security Symposium, стр. 469-484. USENIX Association, (2010)Gray-box extraction of execution graphs for anomaly detection., , и . CCS, стр. 318-329. ACM, (2004)Coercion resistance in authentication responsibility shifting., , и . AsiaCCS, стр. 97-98. ACM, (2012)Your love is public now: questioning the use of personal information in authentication., , , и . AsiaCCS, стр. 49-60. ACM, (2013)Keystroke biometrics: the user perspective., , , и . CODASPY, стр. 289-296. ACM, (2014)OTO: online trust oracle for user-centric trust establishment., , , , , , и . CCS, стр. 391-403. ACM, (2012)iBinHunt: Binary Hunting with Inter-procedural Control Flow., , и . ICISC, том 7839 из Lecture Notes in Computer Science, стр. 92-109. Springer, (2012)Towards ground truthing observations in gray-box anomaly detection., , и . NSS, стр. 25-32. IEEE, (2011)