Search for persons
X
?
Multi-Agent-Based Simulation XXIV; Lecture Notes in Computer Science ,
2
Modeling Cognitive Workload in Open-Source Communities via ..:
, In:
?
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses ,
4
Leader: Defense Against Exploit-Based Denial-of-Service Att..:
, In:
?
Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses ,
5
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-..:
, In:
?
2022 IEEE Security and Privacy Workshops (SPW) ,
6
AutoCPS: Control Software Dataset Generation for Semantic R..:
, In:
?
Proceedings of the 2021 Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks ,
9
PERFUME : Programmatic Extraction and Refinement for Usa..:
, In:
?
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy ,
10
BootKeeper : Validating Software Integrity Properties on..:
, In:
?
Proceedings of the 35th Annual Computer Security Applications Conference ,
11