From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Toward Secure Embedded Web Interfaces., , , и . USENIX Security Symposium, USENIX Association, (2011)TrackBack spam: abuse and prevention., , и . CCSW, стр. 3-10. ACM, (2009)NetQi: A Model Checker for Anticipation Game.. ATVA, том 5311 из Lecture Notes in Computer Science, стр. 246-251. Springer, (2008)The Security Impact of HTTPS Interception., , , , , , , , и . NDSS, The Internet Society, (2017)Designing Toxic Content Classification for a Diversity of Perspectives., , , , , , , и . SOUPS @ USENIX Security Symposium, стр. 299-318. USENIX Association, (2021)Identifying and Mitigating the Security Risks of Generative AI., , , , , , , , , и 13 other автор(ы). Found. Trends Priv. Secur., 6 (1): 1-52 (2023)I am a legend: Hacking hearthstone using statistical learning methods.. CIG, стр. 1-8. IEEE, (2016)Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild., , , , , , , и . Internet Measurement Conference, стр. 347-358. ACM, (2014)Probabilistic Identification for Hard to Classify Protocol.. WISTP, том 5019 из Lecture Notes in Computer Science, стр. 49-63. Springer, (2008)Who is targeted by email-based phishing and malware?: Measuring factors that differentiate risk., , , и . Internet Measurement Conference, стр. 567-576. ACM, (2020)