From post

Designing and Implementing Inter-Client Communication in the O2 Object-Oriented Database Management System.

, , и . ISOOMS, том 858 из Lecture Notes in Computer Science, стр. 53-64. Springer, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Detection of Anomalous System Call Arguments., , , и . ESORICS, том 2808 из Lecture Notes in Computer Science, стр. 326-343. Springer, (2003)Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis., , , , и . WWW, стр. 3108-3115. ACM, (2019)Escape from Monkey Island: Evading High-Interaction Honeyclients., , , и . DIMVA, том 6739 из Lecture Notes in Computer Science, стр. 124-143. Springer, (2011)An Intrusion Detection System for Aglets., , и . Mobile Agents, том 2535 из Lecture Notes in Computer Science, стр. 64-77. Springer, (2002)Practical Attacks against the I2P Network., , , и . RAID, том 8145 из Lecture Notes in Computer Science, стр. 432-451. Springer, (2013)On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users., , , , , , и . DIMVA, том 9148 из Lecture Notes in Computer Science, стр. 282-303. Springer, (2015)Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners., , и . DIMVA, том 6201 из Lecture Notes in Computer Science, стр. 111-131. Springer, (2010)Using Loops For Malware Classification Resilient to Feature-unaware Perturbations., , , , , , и . ACSAC, стр. 112-123. ACM, (2018)Fear the EAR: discovering and mitigating execution after redirect vulnerabilities., , , и . ACM Conference on Computer and Communications Security, стр. 251-262. ACM, (2011)Demystifying NFT Promotion and Phishing Scams., , , , , и . CoRR, (2023)