From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains., , , , и . ACM Trans. Inf. Syst. Secur., 16 (4): 14 (2014)Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008., , , , , и . Comput. Sci. Res. Dev., 23 (1): 15-25 (2009)Fear the EAR: discovering and mitigating execution after redirect vulnerabilities., , , и . ACM Conference on Computer and Communications Security, стр. 251-262. ACM, (2011)deDacota: toward preventing server-side XSS via automatic code and data separation., , , , , и . ACM Conference on Computer and Communications Security, стр. 1205-1216. ACM, (2013)TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems., , , , , , и . CNS, стр. 1-9. IEEE, (2020)EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services., , , , , и . USENIX Security Symposium, стр. 563-578. USENIX Association, (2015)Practical Attacks against the I2P Network., , , и . RAID, том 8145 из Lecture Notes in Computer Science, стр. 432-451. Springer, (2013)On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users., , , , , , и . DIMVA, том 9148 из Lecture Notes in Computer Science, стр. 282-303. Springer, (2015)VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges., , , , , и . DIMVA, том 5137 из Lecture Notes in Computer Science, стр. 44-63. Springer, (2008)Escape from Monkey Island: Evading High-Interaction Honeyclients., , , и . DIMVA, том 6739 из Lecture Notes in Computer Science, стр. 124-143. Springer, (2011)