Personensuche
X
?
Critical Information Infrastructures Security; Lecture Notes in Computer Science ,
1
An Empirical Evaluation of CNC Machines in Industry 4.0 (Sh..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
2
A Security Analysis of CNC Machines in Industry 4.0:
, In:
?
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security ,
4
Detecting Insecure Code Patterns in Industrial Robot Progra..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
5
A Security Evaluation of Industrial Radio Remote Controller:
, In:
?
Proceedings of the 2018 on Asia Conference on Computer and Communications Security ,
6
Investigating Web Defacement Campaigns at Large:
, In:
?
Proceedings of the Symposium on Applied Computing ,
7
Attacks landscape in the dark side of the web:
, In:
?
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security ,
8
MobiPot : Understanding Mobile Telephony Threats with Ho..:
, In:
?
Proceedings of the 25th International Conference on World Wide Web ,
9
Automatic Extraction of Indicators of Compromise for Web Ap..:
, In:
?
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security ,
10
Real-Time Detection of Malware Downloads via Large-Scale UR..:
, In:
?
Proceedings of the 30th Annual Computer Security Applications Conference ,
11
A security evaluation of AIS automated identification syste:
, In:
?
Proceedings of the 27th Annual ACM Symposium on Applied Computing ,
12
A security analysis of amazon's elastic compute cloud servi..:
, In:
?
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security ,
13