From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Forensic Analysis of Configuration-based Attacks., , , , , , и . NDSS, The Internet Society, (2022)Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises., , , , , , , и . RAID, том 10453 из Lecture Notes in Computer Science, стр. 287-310. Springer, (2017)FORTIFY: Software Defined Data Plane Resilience., , , , , , , и . NFV-SDN, стр. 6-12. IEEE, (2022)Poster Abstract: BounceBack - A DDoS Attack Using Unsuspecting Accomplices in the Network., , , , и . INFOCOM Workshops, стр. 1-2. IEEE, (2021)PACED: Provenance-based Automated Container Escape Detection., , , , , , , , , и . IC2E, стр. 261-272. IEEE, (2022)Identifying the provenance of correlated anomalies., , , , , , и . SAC, стр. 224-229. ACM, (2011)The Browsers Strike Back: Countering Cryptojacking and Parasitic Miners on the Web., , , , , и . INFOCOM, стр. 703-711. IEEE, (2019)Using SGX-Based Virtual Clones for IoT Security., , , , и . NCA, стр. 1-4. IEEE, (2018)Proactive abuse prevention in clouds. University of Illinois Urbana-Champaign, USA, (2018)Sneak-Peek: High speed covert channels in data center networks., , , , , , , , и . INFOCOM, стр. 1-9. IEEE, (2016)