From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MIDeA: a multi-parallel intrusion detection architecture., , и . CCS, стр. 297-308. ACM, (2011)Improving the Performance of Passive Network Monitoring Applications using Locality Buffering., , , и . MASCOTS, стр. 151-157. IEEE Computer Society, (2007)Network-Level Polymorphic Shellcode Detection Using Emulation., , и . DIMVA, том 4064 из Lecture Notes in Computer Science, стр. 54-73. Springer, (2006)Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation., , , , , и . NDSS, The Internet Society, (2019)Confine: Automated System Call Policy Generation for Container Attack Surface Reduction., , , и . RAID, стр. 443-458. USENIX Association, (2020)xMP: Selective Memory Protection for Kernel and User Space., , , , и . SP, стр. 563-577. IEEE, (2020)ret2dir: Rethinking Kernel Isolation., , и . USENIX Security Symposium, стр. 957-972. USENIX Association, (2014)Comprehensive shellcode detection using runtime heuristics., , и . ACSAC, стр. 287-296. ACM, (2010)Defending Against Web Application Attacks: Approaches, Challenges and Implications., , , и . IEEE Trans. Dependable Secur. Comput., 16 (2): 188-203 (2019)Using Diversity to Harden Multithreaded Programs Against Exploitation., , и . BigDataSecurity/HPSC/IDS, стр. 208-213. IEEE, (2016)