From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Characterizing kernel malware behavior with kernel data access patterns., , и . AsiaCCS, стр. 207-216. ACM, (2011)RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing., , , , , , , , и . USENIX Security Symposium, стр. 425-442. USENIX Association, (2019)Detecting Malware Injection with Program-DNS Behavior., , , , , , , , , и 1 other автор(ы). EuroS&P, стр. 552-568. IEEE, (2020)DeltaPath: Precise and Scalable Calling Context Encoding., , , , , и . CGO, стр. 109. ACM, (2014)Uscope: A scalable unified tracer from kernel to user space., , , , и . NOMS, стр. 1-8. IEEE, (2014)PerfScope: Practical Online Server Performance Bug Inference in Production Cloud Computing Infrastructures., , , , , , и . SoCC, стр. 8:1-8:13. ACM, (2014)Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring., , , и . ARES, стр. 74-81. IEEE Computer Society, (2009)Data-Centric OS Kernel Malware Characterization., , , , и . IEEE Trans. Inf. Forensics Secur., 9 (1): 72-87 (2014)PowerGrader: Automating Code Assessment Based on PowerShell for Programming Courses., , , и . SERA, стр. 2-7. IEEE, (2023)Commit Message Can Help: Security Patch Detection in Open Source Software via Transformer., , , , и . SERA, стр. 345-351. IEEE, (2023)