From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Criticality analysis of Internet infrastructure., , , , и . Comput. Networks, 54 (7): 1169-1182 (2010)IoTInfer: Automated Blackbox Fuzz Testing of IoT Network Protocols Guided by Finite State Machine Inference., и . IEEE Internet Things J., 9 (22): 22737-22751 (2022)Improving Large-Scale Network Traffic Simulation with Multi-Resolution Models.. Dartmouth College, USA, (2005)Bluetooth worm propagation: mobility pattern matters!, , , , , и . AsiaCCS, стр. 32-44. ACM, (2007)CyberSim: Geographic, temporal, and organizational dynamics of malware propagation., , и . WSC, стр. 2876-2887. IEEE, (2010)SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance., , , , , , , , и . CIC, стр. 81-90. IEEE, (2019)Exploitation and threat analysis of open mobile devices., , , и . ANCS, стр. 20-29. ACM, (2009)Classifying Malware Represented as Control Flow Graphs using Deep Graph Convolutional Neural Network., , и . DSN, стр. 52-63. IEEE, (2019)A Bayesian Cogntive Approach to Quantifying Software Exploitability Based on Reachability Testing., , , и . ISC, том 9866 из Lecture Notes in Computer Science, стр. 343-365. Springer, (2016)Transductive malware label propagation: Find your lineage from your neighbors., и . INFOCOM, стр. 1411-1419. IEEE, (2014)