From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

N-variant systems: a secretless framework for security through diversity, , , , , , , , и . Proceedings of the 15th conference on USENIX Security Symposium - Volume 15, Berkeley, CA, USA, USENIX Association, (2006)Effectiveness of Moving Target Defenses., , и . Moving Target Defense, том 54 из Advances in Information Security, Springer, (2011)Online control adaptation for safe and secure autonomous vehicle operations., , , , , , и . AHS, стр. 101-108. IEEE, (2017)Secure and practical defense against code-injection attacks using software dynamic translation., , , , , , , , и . VEE, стр. 2-12. ACM, (2006)Security through redundant data diversity., , , , и . DSN, стр. 187-196. IEEE Computer Society, (2008)START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report)., , , , , , , , , и 3 other автор(ы). ISSRE, стр. 73-84. IEEE, (2022)Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections., , , , , , , , и . HPCC, том 4782 из Lecture Notes in Computer Science, стр. 260-272. Springer, (2007)Zipr++: Exceptional Binary Rewriting., , , , , и . FEAST@CCS, стр. 9-15. ACM, (2017)The Development of Dependable and Survivable Grids., , , , , , и . International Conference on Computational Science (2), том 3515 из Lecture Notes in Computer Science, стр. 729-737. Springer, (2005)Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing., , , , и . CoRR, (2022)