From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detection of Microgrid Cyberattacks Using Network and System Management., , , , , , и . IEEE Trans. Smart Grid, 14 (3): 2390-2405 (мая 2023)Security Design Patterns: Survey and Evaluation., , , и . CCECE, стр. 1605-1608. IEEE, (2006)BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices., , , , , , и . DIMVA, том 10885 из Lecture Notes in Computer Science, стр. 114-138. Springer, (2018)A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities., , , и . OTM Conferences (2), том 5871 из Lecture Notes in Computer Science, стр. 815-832. Springer, (2009)Targeting Security Vulnerabilities: From Specification to Detection (Short Paper)., , , , и . QSIC, стр. 97-102. IEEE Computer Society, (2008)BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables., , , , и . SEC, том 502 из IFIP Advances in Information and Communication Technology, стр. 341-355. Springer, (2017)AOP Extension for Security Testing of Programs., , , и . CCECE, стр. 647-650. IEEE, (2006)Towards Automation of Testing High-Level Security Properties., , , и . DBSec, том 5094 из Lecture Notes in Computer Science, стр. 268-282. Springer, (2008)On Leveraging Coding Habits for Effective Binary Authorship Attribution., , , , и . ESORICS (1), том 11098 из Lecture Notes in Computer Science, стр. 26-47. Springer, (2018)Security Monitoring of the Microgrid Using IEC 62351-7 Network and System Management., , , , , и . ISGT, стр. 1-5. IEEE, (2022)