From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CCS 2017: Women in Cyber Security (CyberW) Workshop., и . CCS, стр. 2631-2632. ACM, (2017)Secure Coding Practices in Java: Challenges and Vulnerabilities., , , , и . CoRR, (2017)Comparative Measurement of Cache Configurations' Impacts on Cache Timing Side-Channel Attacks., , , и . CSET @ USENIX Security Symposium, USENIX Association, (2019)Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion., , , , , и . ICSE-Companion, стр. 360-361. ACM/IEEE, (2022)A First Look: Using Linux Containers for Deceptive Honeypots., , , и . SafeConfig@CCS, стр. 15-22. ACM, (2017)A semantic-aware approach to reasoning about network traffic relations., , и . CCS, стр. 1375-1378. ACM, (2013)Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations., , и . CCS, стр. 481-498. ACM, (2019)Massive distributed and parallel log analysis for organizational security., , , и . GLOBECOM Workshops, стр. 194-199. IEEE, (2013)ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation., , , и . FEAST@CCS, стр. 35-41. ACM, (2017)Detecting the Onset of Infection for Secure Hosts., , и . RAID, том 6307 из Lecture Notes in Computer Science, стр. 492-493. Springer, (2010)