From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

HeNet: A Deep Learning Approach on Intel® Processor Trace for Effective Exploit Detection., , и . IEEE Symposium on Security and Privacy Workshops, стр. 109-115. IEEE Computer Society, (2018)A file provenance system., и . CODASPY, стр. 153-156. ACM, (2013)Characterizing Failures in Mobile OSes: A Case Study with Android and Symbian., , , и . ISSRE, стр. 249-258. IEEE Computer Society, (2010)Link correlation and network coding in broadcast protocols for wireless sensor networks., , , и . SECON, стр. 59-61. IEEE, (2012)A Lightweight Secure Provenance Scheme for Wireless Sensor Networks., , , и . ICPADS, стр. 101-108. IEEE Computer Society, (2012)Digital provenance - models, systems, and applications. Purdue University, USA, (2014)Effective Key Management in Dynamic Wireless Sensor Networks., , , и . IEEE Trans. Inf. Forensics Secur., 10 (2): 371-383 (2015)A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks., , , и . IEEE Trans. Dependable Secur. Comput., 12 (3): 256-269 (2015)Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces., , , и . ISC, том 11723 из Lecture Notes in Computer Science, стр. 341-359. Springer, (2019)A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks., , и . ICDCS Workshops, стр. 332-338. IEEE Computer Society, (2011)