From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack Detection., , , , , и . ACSAC, стр. 13-27. ACM, (2022)Bridging Both Worlds in Semantics and Time: Domain Knowledge Based Analysis and Correlation of Industrial Process., , , , , , , , и . CoRR, (2023)TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks., , , , и . USENIX Security Symposium, стр. 6701-6718. USENIX Association, (2023)An Inside Look into the Practice of Malware Analysis., , , , , и . CCS, стр. 3053-3069. ACM, (2021)Planning with Abstract Learned Models While Learning Transferable Subtasks., , , , , , , и . AAAI, стр. 9992-10000. AAAI Press, (2020)WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web., , , , , и . USENIX Security Symposium, USENIX Association, (2024)Comparing Malware Evasion Theory with Practice: Results from Interviews with Expert Analysts., , , , и . SOUPS @ USENIX Security Symposium, стр. 61-80. USENIX Association, (2024)Planning with Abstract Learned Models While Learning Transferable Subtasks., , , , , , , и . CoRR, (2019)Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System., , , , , , , , и . ACM Conference on Computer and Communications Security, стр. 787-802. ACM, (2020)Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness., , , , , и . ACSAC, стр. 210-221. ACM, (2018)