From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution., и . Moving Target Defense, том 54 из Advances in Information Security, Springer, (2011)Hands-Free One-Time and Continuous Authentication Using Glass Wearable Devices., и . CoRR, (2018)A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS., , и . ICISS, том 7093 из Lecture Notes in Computer Science, стр. 322-336. Springer, (2011)The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines., , , , и . NDSS, The Internet Society, (2015)Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure., , , , , , , и . EuroS&P, стр. 227-242. IEEE, (2018)Redirect2Own: Protecting the Intellectual Property of User-uploaded Content through Off-site Indirect Access., , и . CoRR, (2018)Paranoid Android: versatile protection for smartphones., , , и . ACSAC, стр. 347-356. ACM, (2010)Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation., , и . EuroSys, стр. 15-27. ACM, (2006)Source-Level Bitwise Branching for Temporal Verification of Lifted Binaries., , , , , , и . CoRR, (2021)Towards Optimal Use of Exception Handling Information for Function Detection., , , , , и . DSN, стр. 338-349. IEEE, (2021)