From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Botnet Attack Detection at the IoT Edge Based on Sparse Representation., , и . GIoTS, стр. 1-6. IEEE, (2019)Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures., , и . CAMAD, стр. 1-6. IEEE, (2020)XR-RF Imaging Enabled by Software-Defined Metasurfaces and Machine Learning: Foundational Vision, Technologies and Challenges., , , , , , , , , и 13 other автор(ы). IEEE Access, (2022)On Architectural Support for Instruction Set Randomization., , , , и . ACM Trans. Archit. Code Optim., 17 (4): 36:1-36:26 (2020)AndRadar: Fast Discovery of Android Applications in Alternative Markets., , , , , , , , и . DIMVA, том 8550 из Lecture Notes in Computer Science, стр. 51-71. Springer, (2014)D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks., , , , и . ESORICS, том 6345 из Lecture Notes in Computer Science, стр. 663-678. Springer, (2010)Demo: Detecting Third-Party Library Problems with Combined Program Analysis., , и . CCS, стр. 2429-2431. ACM, (2021)Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The FISHY approach for the secure autonomous driving domain., , , , , , , , , и . CSR, стр. 464-469. IEEE, (2023)Security Applications of GPUs.. ENASE, стр. 5. SciTePress, (2019)Privacy as an Operating System Service., , и . HotSec, USENIX Association, (2006)