From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Method to Evaluate Software Protection Based on Attack Modeling., , , , , и . HPCC/EUC, стр. 837-844. IEEE, (2013)Exploit dynamic data flows to protect software against semantic attacks., , , , , , , и . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, стр. 1-6. IEEE, (2017)WideSee: towards wide-area contactless wireless sensing., , , , , , , , и . SenSys, стр. 258-270. ACM, (2019)W-Aegis: A Propagation Behavior Based Worm Detection Model for Local Networks., , , и . IAS, стр. 158-162. IEEE Computer Society, (2009)DexPro: A Bytecode Level Code Protection System for Android Applications., , , , , , , и . CSS, том 10581 из Lecture Notes in Computer Science, стр. 367-382. Springer, (2017)Who Move the Treasures: A RFID-based Approach for the Treasures., , , , , , , и . UIC/ATC/ScalCom, стр. 154-162. IEEE Computer Society, (2014)Camel: Smart, Adaptive Energy Optimization for Mobile Web Interactions., , , , , , , , и . INFOCOM, стр. 119-128. IEEE, (2020)Thwarting Android app repackaging by executable code fragmentation., , , , , и . IJHPCN, 10 (4/5): 320-331 (2017)Exploiting Code Diversity to Enhance Code Virtualization Protection., , , , , , , и . ICPADS, стр. 620-627. IEEE, (2018)Cracking Android Pattern Lock in Five Attempts., , , , , , и . NDSS, The Internet Society, (2017)