From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Complexity of Computing Maximal Word Functions., , и . Comput. Complex., (1993)String distances and intrusion detection: Bridging the gap between formal languages and computer security., и . RAIRO Theor. Informatics Appl., 40 (2): 303-313 (2006)Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues., и . Mob. Networks Appl., 7 (6): 503-511 (2002)On Race Vulnerabilities in Web Applications., , , и . DIMVA, том 5137 из Lecture Notes in Computer Science, стр. 126-142. Springer, (2008)FluXOR: Detecting and Monitoring Fast-Flux Service Networks., , , и . DIMVA, том 5137 из Lecture Notes in Computer Science, стр. 186-206. Springer, (2008)The Complexity of Computing Maximal Word Functions., и . FCT, том 529 из Lecture Notes in Computer Science, стр. 157-167. Springer, (1991)Software engineering for secure systems., , и . ICSE, стр. 1007-1008. ACM, (2006)Trusted Internet Forensics: design of a network forensics appliance, , и . Proceedings of the First IEEE/CreateNet Computer Network Forensics Research, IEEE, IEEE, (сентября 2005)How to unwittingly sign non-repudiable documents with Java applications., , , и . ACSAC, стр. 192-196. IEEE Computer Society, (2003)A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators., , , и . WOOT, стр. 1-7. USENIX Association, (2009)