From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PESTEL Analysis of Hacktivism Campaign Motivations., и . NordSec, том 11252 из Lecture Notes in Computer Science, стр. 323-335. Springer, (2018)Investigating child sexual abuse material availability, searches, and users on the anonymous Tor network for a public health intervention strategy., , , , , , , , и . CoRR, (2024)Grain Size Measurement of Crystalline Products Using Maximum Difference Method., , , , и . SCIA, том 4522 из Lecture Notes in Computer Science, стр. 403-410. Springer, (2007)SoK: A Systematic Review of TEE Usage for Developing Trusted Applications., , , , , и . ARES, стр. 34:1-34:15. ACM, (2023)Observing Hidden Service Directory Spying with a Private Hidden Service Honeynet., , и . AsiaJCIS, стр. 55-59. IEEE Computer Society, (2016)An Implementation of a Semantic, Web-Based Virtual Machine Laboratory Prototyping Environment., , , , , , , , , и . ISWC (2), том 7032 из Lecture Notes in Computer Science, стр. 221-236. Springer, (2011)Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access., , и . ARES, стр. 108:1-108:12. ACM, (2023)Tor De-anonymisation Techniques., и . NSS, том 10394 из Lecture Notes in Computer Science, стр. 657-671. Springer, (2017)