From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table., , и . Trustcom/BigDataSE/ISPA, стр. 394-401. IEEE, (2016)An Adaptive Service Strategy Based on User Rating in P2P., , , и . GCC, том 3795 из Lecture Notes in Computer Science, стр. 860-870. Springer, (2005)A Worm Containment Model Based on Neighbor-Alarm., , и . ATC, том 4610 из Lecture Notes in Computer Science, стр. 449-457. Springer, (2007)PerformTrust: Trust model integrated past and current performance in P2P file sharing systems., , , и . AICCSA, стр. 718-725. IEEE Computer Society, (2008)Malware Behavior Capturing Based on Taint Propagation and Stack Backtracing., , и . TrustCom, стр. 328-335. IEEE Computer Society, (2011)FRProtector: Defeating Control Flow Hijacking Through Function-Level Randomization and Transfer Protection., , и . SecureComm, том 238 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 659-672. Springer, (2017)Robot-Assisted quantitative assessment of axis misalignment of wrist joint., , , , , , и . RCAR, стр. 1397-1401. IEEE, (2021)JTaint: Finding Privacy-Leakage in Chrome Extensions., , , , и . ACISP, том 12248 из Lecture Notes in Computer Science, стр. 563-583. Springer, (2020)Occupational Therapy Assessment for Upper Limb Rehabilitation: A Multisensor-Based Approach., , , , и . Frontiers Digit. Health, (2021)Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization., , , , , , и . CCS, стр. 2858-2874. ACM, (2021)