From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Ellipsis: Towards Efficient System Auditing for Real-Time Systems., , , , , и . CoRR, (2022)NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage., , , , , , и . NDSS, The Internet Society, (2019)Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution., , , , , , и . NDSS, The Internet Society, (2020)Fear and Logging in the Internet of Things., , , и . NDSS, The Internet Society, (2018)Making USB Great Again with USBFILTER., , , , и . USENIX Security Symposium, стр. 415-430. USENIX Association, (2016)Skill Squatting Attacks on Amazon Alexa., , , , , , и . USENIX Security Symposium, стр. 33-47. USENIX Association, (2018)Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations., , и . ESORICS (3), том 13556 из Lecture Notes in Computer Science, стр. 166-185. Springer, (2022)A Provenance Model for the European Union General Data Protection Regulation., , и . IPAW, том 11017 из Lecture Notes in Computer Science, стр. 45-57. Springer, (2018)Tactical Provenance Analysis for Endpoint Detection and Response Systems., , и . SP, стр. 1172-1189. IEEE, (2020)Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks., , , , , и . CCS, стр. 3337-3351. ACM, (2021)