Personensuche
X
?
Proceedings of the 15th International Conference on Availability, Reliability and Security ,
3
Generalizing the phishing principle : analyzing user beh..:
, In:
?
Proceedings of the 15th International Conference on Availability, Reliability and Security ,
4
Towards detection of software supply chain attacks by foren..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
5
Backstabber's Knife Collection: A Review of Open Source Sof..:
, In:
?
Proceedings of the 14th International Conference on Availability, Reliability and Security ,
7
Automated Pattern Inference Based on Repeatedly Observed Ma..:
, In:
?
Proceedings of the 13th International Conference on Availability, Reliability and Security ,
8
Hunting Observable Objects for Indication of Compromise:
, In:
?
Proceedings of the 15th ACM International Conference on Computing Frontiers ,
9