From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fine-grained tracking of Grid infections., , , , и . GRID, стр. 73-80. IEEE Computer Society, (2010)Digital-first assessments: A security framework., , , , , и . J. Comput. Assist. Learn., 38 (4): 1077-1086 (2022)Policy-Based Integration of Provenance Metadata., , , и . POLICY, стр. 149-152. IEEE Computer Society, (2011)Identifying the provenance of correlated anomalies., , , , , , и . SAC, стр. 224-229. ACM, (2011)SoK: Introspections on Trust and the Semantic Gap., , , , и . IEEE Symposium on Security and Privacy, стр. 605-620. IEEE Computer Society, (2014)Human-in-the-Loop AI for Cheating Ring Detection., , , и . CoRR, (2024)A Domain-Agnostic Approach to Spam-URL Detection via Redirects., , и . PAKDD (2), том 10235 из Lecture Notes in Computer Science, стр. 220-232. (2017)CloudFlow: Cloud-wide Policy Enforcement Using Fast VM Introspection., , , , и . IC2E, стр. 159-164. IEEE Computer Society, (2014)Correlation of Node Importance Measures: An Empirical Study through Graph Robustness., и . WWW (Companion Volume), стр. 275-281. ACM, (2015)Introspections on the Semantic Gap., , , , и . IEEE Secur. Priv., 13 (2): 48-55 (2015)