From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Study on the Digital Forensic Method for Decentralized Web Service., , и . ICEA, стр. 37:1-37:6. ACM, (2020)An Empirical Study on the Stability of Explainable Software Defect Prediction., , , , , и . APSEC, стр. 141-150. IEEE, (2023)Prompt Engineering or Fine Tuning: An Empirical Assessment of Large Language Models in Automated Software Engineering Tasks., , , , , и . CoRR, (2023)Detection and Analysis Technique for Manipulation Attacks on PLC Control Logic., , , и . ICEA, стр. 46:1-46:6. ACM, (2020)Research on PEB-LDR Data Analysis Technique for DLL Injection Detection on ICS Engineering Workstation., , и . ICEA, стр. 35:1-35:7. ACM, (2020)OCR Meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime., , , и . WISA, том 14402 из Lecture Notes in Computer Science, стр. 201-212. Springer, (2023)A Study on the Application of Technical Assessment Methodology (TAM) for CyberSecurity in Nuclear Power Plant., , , , и . ICEA, стр. 44:1-44:7. ACM, (2020)Characterizing and Understanding Software Security Vulnerabilities in Machine Learning Libraries., , , , и . MSR, стр. 27-38. IEEE, (2023)Assessing Evaluation Metrics for Neural Test Oracle Generation., , , и . CoRR, (2023)A study on command block collection and restoration techniques through detection of project file manipulation on engineering workstation of industrial control system., , и . Digit. Investig., 40 (Supplement): 301354 (2022)