From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things., , и . WiSec, стр. 140-150. ACM, (2019)Toward an Automatic Exploit Generation Competition for an Undergraduate Binary Reverse Engineering Course., , , , и . ITiCSE (1), стр. 442-448. ACM, (2022)Never Ending Story: Authentication and Access Control Design Flaws in Shared IoT Devices., , и . SP (Workshops), стр. 104-109. IEEE, (2020)Towards Labeling On-Demand IoT Traffic., и . CSET @ USENIX Security Symposium, стр. 49-57. ACM, (2021)Toward a Labeled Dataset of IoT Malware Features., и . COMPSAC, стр. 924-933. IEEE, (2023)A Replication Study for IoT Privacy Preferences., , , и . COINS, стр. 1-8. IEEE, (2021)HELO DarkSide: Breaking Free From Katas and Embracing the Adversarial Mindset in Cybersecurity Education.. SIGCSE (1), стр. 710-716. ACM, (2022)PivotWall: SDN-Based Information Flow Control., , , и . SOSR, стр. 3:1-3:14. ACM, (2018)Towards Binary Diversified Challenges For A Hands-On Reverse Engineering Course., и . ITiCSE (1), стр. 102-107. ACM, (2021)Through the Spyglass: Towards IoT Companion App Man-in-the-Middle Attacks., , и . CSET @ USENIX Security Symposium, стр. 58-62. ACM, (2021)