Personensuche
X
?
Engineering Applications of Neural Networks; Communications in Computer and Information Science ,
1
An Autoencoder-Based Approach for Anomaly Detection of Mach..:
, In:
?
Computer Security – ESORICS 2021; Lecture Notes in Computer Science ,
4
PoW-How: An Enduring Timing Side-Channel to Evade Online Ma..:
, In:
?
Proceedings of the 32nd Annual Conference on Computer Security Applications ,
5
RevProbe : detecting silent reverse proxies in malicious..:
, In:
?
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security ,
6
AUTOPROBE : Towards Automatic Active Malicious Server Pr..:
, In:
?
Proceedings of the 2014 Conference on Internet Measurement Conference ,
8
WhoWas : A Platform for Measuring Web Deployments on Iaa..:
, In:
?
Proceedings of the 2012 ACM conference on Computer and communications security ,
9
Manufacturing compromise : the emergence of exploit-as-a..:
, In:
?
Proceedings of the 2012 International Symposium on Software Testing and Analysis ,
10