From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards a Software Engineering Approach to Web Site Development., , , и . IWSSD, стр. 8-17. IEEE Computer Society, (1998)Peer to Peer Hate: Hate Speech Instigators and Their Targets., , , , и . ICWSM, стр. 52-61. AAAI Press, (2018)Mnemosyne: Designing and Implementing Network Short-Term Memory., и . ICECCS, стр. 91-100. IEEE Computer Society, (2002)Dirty Clicks: A Study of the Usability and Security Implications of Click-related Behaviors on the Web., , , , и . WWW, стр. 395-406. ACM / IW3C2, (2020)Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis., , , , , и . NDSS, The Internet Society, (2007)Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis., , , , , , и . NDSS, The Internet Society, (2017)Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications., , , , и . NDSS, The Internet Society, (2014)EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework., , , , , , и . NDSS, The Internet Society, (2015)PiOS: Detecting Privacy Leaks in iOS Applications., , , и . NDSS, The Internet Society, (2011)A Parallel Architecture for Stateful, High-Speed Intrusion Detection., , , , и . ICISS, том 5352 из Lecture Notes in Computer Science, стр. 203-220. Springer, (2008)