From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (11): 2026-2033 (2010)User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts., , , , , и . EuroS&P, стр. 323-337. IEEE, (2018)Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites., , , и . NDSS, The Internet Society, (2020)API Chaser: Taint-Assisted Sandbox for Evasive Malware Analysis., , , и . J. Inf. Process., (2019)Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks., , , и . ACSAC, стр. 309-318. ACM, (2012)Stealth Loader: Trace-Free Program Loading for API Obfuscation., , , , и . RAID, том 10453 из Lecture Notes in Computer Science, стр. 217-237. Springer, (2017)Analyzing the Use of Public and In-house Secure Development Guidelines in U.S. and Japanese Industries., , , и . CHI, стр. 187:1-187:17. ACM, (2023)API Chaser: Anti-analysis Resistant Malware Analyzer., , , и . RAID, том 8145 из Lecture Notes in Computer Science, стр. 123-143. Springer, (2013)Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services., , , , и . J. Inf. Process., (2020)A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects., , , и . ACSAC, стр. 349-364. ACM, (2021)