引用

正在加载 ......

复制并粘贴一种已设定格式的引用方法,或利用其中一个链接导入到参考书目管理软件中。
导入链接
本篇论文的引用数据正在构建中,请先尝试其他论文。

下载资源

正在加载 ......

本篇论文的可下载资源正在构建中,请先尝试在线浏览。
  1. cseweb.ucsd.edu/~savage

    Risky BIZness: Risks Derived from Registrar Name Management, Gautam Akiwate, Stefan Savage, Geoffrey M. Voelker, and kc Claffy, Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021.. Who's Got Your Mail? Characterizing Mail Service Provider Usage, Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Stefan Savage, and Geoffrey M. Voelker, Proceedings …

  2. https://en.wikipedia.org/wiki/Stefan_Savage

    Stefan Savage (born 1969) is an American computer science researcher, currently a Professor in the Systems and Networking Group at the University of California, San Diego.There, he holds the Irwin and Joan Jacobs Chair in Information and Computer Science. Savage is widely cited in computer security, particularly in the areas of email spam, network worms and malware propagation, distributed ...

  3. https://www.macfound.org/fellows/class-of-2017/stefan-savage

    Stefan Savage is a computer scientist using an interdisciplinary approach to address challenges to computer security and to counter cybercrime. In addition to identifying technological deficiencies, he contextualizes cybersecurity threats within much broader ecosystems, including underlying economic incentives and social structures contributing ...

  4. https://www.youtube.com/watch?v=VSxx8f0Ipy8

    No co-main event do Savage MMA, Stefan Magalhães (Alcateia MMA) venceu Washington Farlley (Templo da Luta) por finalização aos 2:43 do primeiro round - 61kg....

  5. https://scholar.google.com/citations?user=_JhgbioAAAAJ

    Stefan Savage. Professor of Computer Science and Engineering, UC San Diego. Verified email at cs.ucsd.edu - Homepage. Security Computer Security Networking Computer Networks Operating Systems. Articles Cited by Public access Co-authors.

  6. https://www.blackhat.com/presentations/bh-usa-08/Shacham/BH_US_08_Shacham_Return...

    Return-oriented Programming: Exploitation without Code Injection Erik Buchanan, Ryan Roemer, Stefan Savage, Hovav Shacham University of California, San Diego

  7. https://cseweb.ucsd.edu/~klevchen/diesel-sp17.pdf

    How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles Moritz Contag , Guo Liy, Andre Pawlowski , Felix Domkez, Kirill Levchenko y, Thorsten Holz , and Stefan Savage Ruhr-Universit¨at Bochum, Germany, fmoritz.contag,andre.pawlowski,thorsten.holzg@rub.de

  8. www.autosec.org/pubs/cars-oakland2010.pdf

    Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage Department of Computer Science and Engineering University of California San Diego La Jolla, California 92093–0404 Email: {s,dlmccoy,brian,d8anders,hovav,savage}@cs.ucsd.edu Abstract—Modern automobiles are no longer mere mechan-

  9. https://www.facebook.com/public/Stefan-Savage

    View the profiles of people named Stefan Savage. Join Facebook to connect with Stefan Savage and others you may know. Facebook gives people the power to...

  10. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3029140

    Alexander Gamero-Garrido, Stefan Savage, Kirill Levchenko, and Alex C. Snoeren. 2017. Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17). …