From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Parameterizing access control for heterogeneous peer-to-peer applications., и . SecureComm, стр. 269-278. IEEE, (2007)autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning., , , , , , и . IEEE Trans. Software Eng., 49 (4): 2761-2775 (апреля 2023)Trade-Offs in Automatic Provenance Capture., , , , , , и . IPAW, том 9672 из Lecture Notes in Computer Science, стр. 29-41. Springer, (2016)RheoStat: Real-Time Risk Management., и . RAID, том 3224 из Lecture Notes in Computer Science, стр. 296-314. Springer, (2004)TRIMMER: application specialization for code debloating., , , и . ASE, стр. 329-339. ACM, (2018)SoK: A Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their Compositions., , , , , , , , , и 3 other автор(ы). ESORICS (4), том 14347 из Lecture Notes in Computer Science, стр. 229-249. Springer, (2023)Fine-grained tracking of Grid infections., , , , и . GRID, стр. 73-80. IEEE Computer Society, (2010)Expressiveness Benchmarking for System-Level Provenance., , , , и . TaPP, USENIX Association, (2017)On the (f)utility of untrusted data sanitization., , , , и . MILCOM, стр. 1261-1266. IEEE, (2011)Super-Resolution Video Analysis for Forensic Investigations., и . IFIP Int. Conf. Digital Forensics, том 242 из IFIP, стр. 281-299. Springer, (2007)