From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adversarial testing of wireless routing implementations., , , , и . WISEC, стр. 143-148. ACM, (2013)Removing the blinders: Using information to mitigate adversaries in adaptive overlays., , и . NSS, стр. 129-136. IEEE, (2011)Gatling: Automatic Performance Attack Discovery in Large-Scale Distributed Systems., , , , и . ACM Trans. Inf. Syst. Secur., 17 (4): 13:1-13:34 (2015)Automated Adversarial Testing of Unmodified Wireless Routing Implementations., , , , и . IEEE/ACM Trans. Netw., 24 (6): 3369-3382 (2016)Life, Death, and the Critical Transition: Finding Liveness Bugs in Systems Code (Awarded Best Paper)., , , и . NSDI, USENIX, (2007)Mace: language support for building distributed systems., , , , и . PLDI, стр. 179-188. ACM, (2007)Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations., , , , и . ICDCS, стр. 660-669. IEEE Computer Society, (2014)Programming Model Support for Dependable, Elastic Cloud Applications., , , и . HotDep, USENIX Association, (2012)Pip: Detecting the Unexpected in Distributed Systems., , , , , и . NSDI, USENIX, (2006)Live Debugging of Distributed Systems., , , и . CC, том 5501 из Lecture Notes in Computer Science, стр. 94-108. Springer, (2009)