From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysis and prediction of web proxies misbehavior., , и . ARES, стр. 61:1-61:11. ACM, (2022)DroidKin: Lightweight Detection of Android Apps Similarity., , и . SecureComm (1), том 152 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 436-453. Springer, (2014)Probing the Limits of Virtualized Software Protection., , , и . PPREW@ACSAC, стр. 5:1-5:11. ACM, (2014)Enriching reverse engineering through visual exploration of Android binaries., , и . PPREW@ACSAC, стр. 9:1-9:9. ACM, (2015)On Evaluation of Response Cost for Intrusion Response Systems., , , и . RAID, том 5230 из Lecture Notes in Computer Science, стр. 390-391. Springer, (2008)Trust Framework for P2P Networks Using Peer-Profile Based Anomaly Technique., , , и . ICDCS Workshops, стр. 203-209. IEEE Computer Society, (2005)Large Language Model vs. Stack Overflow in Addressing Android Permission Related Challenges., , и . MSR, стр. 373-383. IEEE, (2024)Authenticated Range Querying of Historical Blockchain Healthcare Data Using Authenticated Multi-Version Index., , , и . Distributed Ledger Technol. Res. Pract., 3 (2): 15 (июня 2024)A Reputation-based Trust Management in Peer-to-Peer Network Systems., , , и . PDCS, стр. 510-515. ISCA, (2004)A Framework for Cost Sensitive Assessment of Intrusion Response Selection., , , и . COMPSAC (1), стр. 355-360. IEEE Computer Society, (2009)