From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling., , , , , , и . ACSAC, стр. 278-288. ACM, (2018)Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases., , , , , , , , , и 1 other автор(ы). NDSS, The Internet Society, (2021)CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing., , , , , , , , , и 3 other автор(ы). SP, стр. 1109-1124. IEEE, (2021)TrustZone Explained: Architectural Features and Use Cases., , , , и . CIC, стр. 445-451. IEEE Computer Society, (2016)SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms., , , , , и . CODASPY, стр. 161-163. ACM, (2018)Tamper detection scheme using signature segregation on android platform., , , , и . ICCE-Berlin, стр. 459-462. IEEE, (2015)Large-Scale Analysis on Anti-Analysis Techniques in Real-World Malware., , и . IEEE Access, (2022)Automated Multi-Layered Bytecode Generation for Preventing Sensitive Information Leaks From Android Applications., , , , и . IEEE Access, (2021)Dazzle-attack: Anti-Forensic Server-side Attack via Fail-Free Dynamic State Machine., , , , , , , и . WISA, том 13720 из Lecture Notes in Computer Science, стр. 204-221. Springer, (2022)Anti-debugging scheme for protecting mobile apps on android platform., , , и . J. Supercomput., 72 (1): 232-246 (2016)