From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using virtual machines to do cross-layer damage assessment., , , и . VMSec, стр. 29-38. ACM, (2008)Cross-layer comprehensive intrusion harm analysis for production workload server systems., , , и . ACSAC, стр. 297-306. ACM, (2010)Comprehensive Analysis of the Android Google Play's Auto-update Policy., , и . ISPEC, том 9065 из Lecture Notes in Computer Science, стр. 365-377. Springer, (2015)Fast Recovery from Hidden Node Collision for IEEE 802.15.4 LR-WPANs., и . CIT, стр. 393-398. IEEE Computer Society, (2007)A Study of Network Domains Used in Android Applications., , и . NSS, том 9408 из Lecture Notes in Computer Science, стр. 467-474. Springer, (2015)HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming., , , , и . ICICS, том 7043 из Lecture Notes in Computer Science, стр. 360-373. Springer, (2011)Practical Backdoor Attack Against Speaker Recognition System., , , и . ISPEC, том 13620 из Lecture Notes in Computer Science, стр. 468-484. Springer, (2022)Running OS Kernel in Separate Domains: A New Architecture for Applications and OS Services Quarantine., , , , и . APSEC, стр. 219-228. IEEE, (2018)All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo., , , , , , и . GLOBECOM, стр. 1-6. IEEE, (2018)CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition., , , , , , , , , и . USENIX Security Symposium, стр. 49-64. USENIX Association, (2018)