From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient and Scalable Workflows for Genomic Analyses., , , , , , и . DIDC@HPDC, стр. 27-36. ACM, (2016)Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster)., , , и . SIN, стр. 492. ACM, (2014)Preemptive intrusion detection: theoretical framework and real-world measurements., , , , и . HotSoS, стр. 5:1-5:12. ACM, (2015)Live forensics for HPC systems: a case study on distributed storage systems., , , , , , , и . SC, стр. 65. IEEE/ACM, (2020)On accelerating pair-HMM computations in programmable hardware., , , , , и . FPL, стр. 1-8. IEEE, (2017)Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants., , , , и . DSN, стр. 13-24. IEEE Computer Society, (2014)A Data-Driven Approach to Soil Moisture Collection and Prediction., , и . SMARTCOMP, стр. 1-6. IEEE Computer Society, (2016)Personalized password guessing: a new security threat., , , , , и . HotSoS, стр. 22. ACM, (2014)AcMC 2 : Accelerating Markov Chain Monte Carlo Algorithms for Probabilistic Models., , и . ASPLOS, стр. 515-528. ACM, (2019)CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks., , , , , , и . NSDI, стр. 667-682. USENIX Association, (2019)