From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Centralized Monitoring Infrastructure for Improving DNS Security., , , , , и . RAID, том 6307 из Lecture Notes in Computer Science, стр. 18-37. Springer, (2010)Towards more accurate severity prediction and fixer recommendation of software bugs., , , , и . J. Syst. Softw., (2016)CloudBot: Advanced mobile botnets using ubiquitous cloud technologies., , , , , и . Pervasive Mob. Comput., (2017)Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals., , и . EURASIP J. Adv. Signal Process., (2009)ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks., , , , , и . IEEE Internet Things J., 10 (14): 12521-12536 (июля 2023)PackerGrind: An Adaptive Unpacking System for Android Apps., , , , , , и . IEEE Trans. Software Eng., 48 (2): 551-570 (2022)STRE: An Automated Approach to Suggesting App Developers When to Stop Reading Reviews., , , , , , , и . IEEE Trans. Software Eng., 49 (8): 4135-4151 (августа 2023)ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels., , , , , , , , и . CCS, стр. 734-748. ACM, (2021)Demystifying Illegal Mobile Gambling Apps., , , , , и . WWW, стр. 1447-1458. ACM / IW3C2, (2021)Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications., , , , и . Inscrypt, том 11449 из Lecture Notes in Computer Science, стр. 349-369. Springer, (2018)