From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hotspot-based traceback for mobile ad hoc networks., и . Workshop on Wireless Security, стр. 43-54. ACM, (2005)Heterogeneous networking: a new survivability paradigm., , , , и . NSPW, стр. 33-39. ACM, (2001)Understanding the prevalence and use of alternative plans in malware with network games., , , и . ACSAC, стр. 1-10. ACM, (2011)An assessment of VoIP covert channel threats., и . SecureComm, стр. 371-380. IEEE, (2007)RecProv: Towards Provenance-Aware User Space Record and Replay., , и . IPAW, том 9672 из Lecture Notes in Computer Science, стр. 3-15. Springer, (2016)Measuring and Preventing Supply Chain Attacks on Package Managers., , , , , и . CoRR, (2020)Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising., , , , и . ACM Conference on Computer and Communications Security, стр. 129-140. ACM, (2014)Beheading hydras: performing effective botnet takedowns., , , , и . ACM Conference on Computer and Communications Security, стр. 121-132. ACM, (2013)Using artificial anomalies to detect unknown and known network intrusions., , , , и . Knowl. Inf. Syst., 6 (5): 507-527 (2004)BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation., , , , и . USENIX Security Symposium, USENIX Association, (2007)