Search for persons
X
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
1
Syntax-Aware Mutation for Testing the Solidity Compiler:
, In:
?
2024 7th International Balkan Conference on Communications and Networking (BalkanCom) ,
3
Realizing RF Wavefront Copying with RIS for Future Extended..:
, In:
?
Proceedings of the ACM on Web Conference 2024 ,
5
Fingerprinting the Shadows: Unmasking Malicious Servers wit..:
, In:
?
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security ,
7
BinWrap: Hybrid Protection against Native Node.js Add-ons:
, In:
?
2023 IEEE International Conference on Communications Workshops (ICC Workshops) ,
8
Comparing SWIPT Techniques for Zero-Energy RIS:
, In:
?
Proceedings of the 2023 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining ,
9
Russo-Ukrainian War: Prediction and explanation of Twitter ..:
, In:
?
2023 IEEE International Conference on Cyber Security and Resilience (CSR) ,
12
Continuous Security Assurance of Modern Supply-Chain Ecosys..:
, In:
?
Computer Security. ESORICS 2022 International Workshops; Lecture Notes in Computer Science ,
13
HoneyChart: Automated Honeypot Management over Kubernetes:
, In:
?
2023 IEEE International Mediterranean Conference on Communications and Networking (MeditCom) ,
14
Slotted ALOHA with Code Combining for IoT Networks:
, In:
?
2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) ,
15