From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared?, , , и . SEGS@CCS, стр. 13-22. ACM, (2014)POISED: Spotting Twitter Spam Off the Beaten Paths., , , , , , , и . CCS, стр. 1159-1174. ACM, (2017)Nexat: a history-based approach to predict attacker actions., , , , и . ACSAC, стр. 383-392. ACM, (2011)Extracting probable command and control signatures for detecting botnets., , , и . SAC, стр. 1657-1662. ACM, (2014)Who is targeted by email-based phishing and malware?: Measuring factors that differentiate risk., , , и . Internet Measurement Conference, стр. 567-576. ACM, (2020)Hit 'em where it hurts: a live security exercise on cyber situational awareness., , , , , , , и . ACSAC, стр. 51-61. ACM, (2011)Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale., , , , , , , , и . USENIX Security Symposium, стр. 361-377. USENIX Association, (2020)Know Your Achilles' Heel: Automatic Detection of Network Critical Services., , , , и . ACSAC, стр. 41-50. ACM, (2015)Rippler: Delay injection for service dependency detection., , , и . INFOCOM, стр. 2157-2165. IEEE, (2014)Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials., , , , , , , , , и 3 other автор(ы). CCS, стр. 1421-1434. ACM, (2017)