From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications., , , и . DASC/PiCom/CBDCom/CyberSciTech, стр. 916-920. IEEE, (2023)Exploiting Marked Temporal Point Processes for Predicting Activities of Daily Living., , , , и . ICHMS, стр. 1-6. IEEE, (2020)VIPOC Project Research Summary (Discussion Paper)., , , , , , , , и . SEBD, стр. 208-215. Curran Associates, Inc., (2015)Exotic Compilers as a Malware Evasion Technique., , и . SEBD, том 2400 из CEUR Workshop Proceedings, CEUR-WS.org, (2019)How to implement a big data clustering algorithm: a brief report on lesson learned., , , и . SAC, стр. 1073-1080. ACM, (2019)A compact encoding of security logs for high performance activity detection., и . PDP, стр. 240-244. IEEE, (2021)Some Experiments on High Performance Anomaly Detection., и . PDP, стр. 226-229. IEEE, (2022)Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone., , , , , , , , и . Checkmate@CCS, стр. 43-57. ACM, (2021)Explaining Binary Obfuscation., , , и . CSR, стр. 22-27. IEEE, (2023)Enabling Faster Security Assessment of Re-hosted Firmware., , , и . DASC/PiCom/CBDCom/CyberSciTech, стр. 1-6. IEEE, (2022)