Search for persons
X
?
Proceedings of the 19th International Conference on Availability, Reliability and Security ,
1
From Code to EM Signals: A Generative Approach to Side Chan..:
, In:
?
2020 IEEE Security and Privacy Workshops (SPW) ,
2
EM Fingerprints: Towards Identifying Unauthorized Hardware ..:
, In:
?
2019 IEEE International Conference on Bioinformatics and Biomedicine (BIBM) ,
3
Identifying Near-Native Protein Structures via Anomaly Dete..:
, In:
?
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy ,
5
Detecting ROP with Statistical Learning of Program Characte..:
, In:
?
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining ,
8
Detecting outliers using transduction and statistical testi..:
, In:
?
Proceedings of the 2003 ACM symposium on Applied computing ,
9
Bootstrapping a data mining intrusion detection system:
, In:
?
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining ,
10
Screening and interpreting multi-item associations based on..:
, In:
?
Proceedings of the eleventh international conference on Information and knowledge management ,
14