From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Panel: Trustworthy Data Science.. CODASPY, стр. 217. ACM, (2017)Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract)., , , , , , и . AAMAS, стр. 1377-1378. ACM, (2016)EARs in the wild: large-scale analysis of execution after redirect vulnerabilities., , , и . SAC, стр. 1792-1799. ACM, (2013)History and Future of Automated Vulnerability Analysis.. SACMAT, стр. 147. ACM, (2019)Users Really Do Answer Telephone Scams., , , и . USENIX Security Symposium, стр. 1327-1340. USENIX Association, (2019)Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service., , , , , , , , , и . USENIX Security Symposium, стр. 4169-4186. USENIX Association, (2021)Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers., , , , , , , и . WOOT @ USENIX Security Symposium, USENIX Association, (2020)Improving source-code representations to enhance search-based software repair., , , , , и . GECCO, стр. 1336-1344. ACM, (2022)Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner., , , и . USENIX Security Symposium, стр. 523-538. USENIX Association, (2012)PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists., , , , , и . IEEE Symposium on Security and Privacy, стр. 1344-1361. IEEE, (2019)