From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service., , , , , , , , , и . USENIX Security Symposium, стр. 4169-4186. USENIX Association, (2021)INCS: Intent-driven network-wide configuration synthesis based on deep reinforcement learning., , , , и . Comput. Networks, (2024)Normalized ground states for Schrödinger system with a coupled critical nonlinearity., и . Appl. Math. Lett., (апреля 2024)On mitigating hotspots to maximize network lifetime in multi-hop wireless sensor network with guaranteed transport delay and reliability., , , , и . Peer-to-Peer Netw. Appl., 7 (3): 255-273 (2014)Scam Pandemic: How Attackers Exploit Public Fear through Phishing., , , , , , , , , и 2 other автор(ы). eCrime, стр. 1-10. IEEE, (2020)I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior., , , , , , , , , и 2 other автор(ы). CCS, стр. 3165-3179. ACM, (2022)Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone., , , , , , , и . ACSAC, стр. 441-452. ACM, (2018)iCore: continuous and proactive extrospection on multi-core IoT devices., , , , и . SAC, стр. 851-860. ACM, (2019)Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale., , , , , , , , и . USENIX Security Symposium, стр. 361-377. USENIX Association, (2020)Joint Beamforming and Rate Splitting Scheme Design for Overloaded Industrial Private Networks., , , , , , и . ICC Workshops, стр. 813-818. IEEE, (2023)