From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks., и . DIMVA, том 5587 из Lecture Notes in Computer Science, стр. 68-87. Springer, (2009)YabAI: The First Rescue Simulation League Champion., , и . RoboCup, том 2377 из Lecture Notes in Computer Science, стр. 49-59. Springer, (2001)User-level disk-bandwidth control for resource-borrowing network applications., и . NOMS, IEEE, (2006)A Framework for Building Linux-Based Single-Purpose Appliances Optimized for the Cloud., и . CloudCom, стр. 305-308. IEEE, (2019)Reducing Security Policy Size for Internet Servers in Secure Operating Systems., , , , и . IEICE Trans. Inf. Syst., 92-D (11): 2196-2206 (2009)Enforcing appropriate process execution for exploiting idle resources from outside operating systems., , и . EuroSys, стр. 27-40. ACM, (2008)FoxyTechnique: tricking operating system policies with a virtual machine monitor., и . VEE, стр. 55-64. ACM, (2007)Who Writes What Checkers? - Learning from Bug Repositories., и . HotDep, USENIX Association, (2014)Automated detection of session management vulnerabilities in web applications., , и . PST, стр. 112-119. IEEE Computer Society, (2012)Narrowing Down Possible Causes of Performance Anomaly in Web Applications., и . EDCC, стр. 185-190. IEEE Computer Society, (2010)