From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security., , , и . IEEE Trans. Inf. Forensics Secur., 14 (9): 2315-2330 (2019)From Very Weak to Very Strong: Analyzing Password-Strength Meters., и . NDSS, The Internet Society, (2014)Exposed by Default: A Security Analysis of Home Router Default Settings., , , , , и . AsiaCCS, ACM, (2024)A Survey and Analysis of TLS Interception Mechanisms and Motivations: Exploring how end-to-end TLS is made "end-to-me" for web traffic., и . ACM Comput. Surv., 55 (13s): 269:1-269:40 (2023)Challenges and implications of verifiable builds for security-critical open-source software., и . ACSAC, стр. 16-25. ACM, (2014)The Flaw Within: Identifying CVSS Score Discrepancies in the NVD., , , , и . CloudCom, стр. 185-192. IEEE, (2023)Privacy and Security Risks of "Not-a-Virus" Bundled Adware: The Wajam Case., и . CoRR, (2019)Killed by Proxy: Analyzing Client-end TLS Interce., и . NDSS, The Internet Society, (2016)Detecting command injection vulnerabilities in Linux-based embedded firmware with LLM-based taint analysis of library functions., , , , , и . Comput. Secur., (2024)