Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Zhauniarovich, Yury"'
Web-based hosting services for version control, such as GitHub, have made it easier for people to develop, share, and donate money to software repositories. In this paper, we study the use of Bitcoin to make donations to open source repositories on G
Externí odkaz:
http://arxiv.org/abs/1907.04002
Autor:
Dashevskyi, Stanislav, Zhauniarovich, Yury, Gadyatskaya, Olga, Pilgun, Aleksandr, Ouhssain, Hamza
Cryptojacking applications pose a serious threat to mobile devices. Due to the extensive computations, they deplete the battery fast and can even damage the device. In this work we make a step towards combating this threat. We collected and manually
Externí odkaz:
http://arxiv.org/abs/1905.02602
Autor:
Pilgun, Aleksandr, Gadyatskaya, Olga, Dashevskyi, Stanislav, Zhauniarovich, Yury, Kushniarou, Artsiom
Today, there are millions of third-party Android applications. Some of these applications are buggy or even malicious. To identify such applications, novel frameworks for automated black-box testing and dynamic analysis are being developed by the And
Externí odkaz:
http://arxiv.org/abs/1812.10729
Publikováno v:
ACM Comput. Surv. 51 (2018) 67:1-67:36
Malicious domains are one of the major resources required for adversaries to run attacks over the Internet. Due to the important role of the Domain Name System (DNS), extensive research has been conducted to identify malicious domains based on their
Externí odkaz:
http://arxiv.org/abs/1805.08426
Autor:
Zhauniarovich, Yury
During the last few years mobile phones have been being replaced by new devices called smartphones. A more ``intelligent'' version of a mobile phones, smartphones combine usual ``phoning'' facilities with the functionality and performance of personal
Externí odkaz:
https://hdl.handle.net/11572/368983
http://zhauniarovich.com
http://zhauniarovich.com
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Secure IT Systems (9783319475592); 2016, p135-151, 17p
Publikováno v:
2016 IEEE Symposium on Visualization for Cyber Security (VizSec); 2016, p1-8, 8p
Autor:
Zhauniarovich, Yury, Gadyatskaya, Olga
Publikováno v:
Research in Attacks, Intrusions & Defenses (9783319457185); 2016, p346-367, 22p