Author of the publication

Obfuscation and Diversification for Securing Cloud Computing.

, , , , , and . ES, volume 10131 of Lecture Notes in Computer Science, page 179-202. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An interface diversified honeypot for malware analysis., , and . ECSA Workshops, page 29. ACM, (2016)Security in container-based virtualization through vTPM., , and . UCC, page 214-219. ACM, (2016)Analysis of Security in Modern Container Platforms., , , and . Research Advances in Cloud Computing, Springer, (2017)A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification., , , , , , and . NordSec, volume 10014 of Lecture Notes in Computer Science, page 152-168. (2016)A Survey on Application Sandboxing Techniques., , and . CompSysTech, page 141-148. ACM, (2017)Symbol diversification of linux binaries., , , , , and . WorldCIS, page 74-79. IEEE, (2014)Diversification and obfuscation techniques for software security: A systematic literature review., , , , , , and . Inf. Softw. Technol., (2018)Internal Interface Diversification as a Security Measure in Sensor Networks., , , , , , and . J. Sens. Actuator Networks, 7 (1): 12 (2018)A Survey on Anti-honeypot and Anti-introspection Methods., , , and . WorldCIST (2), volume 570 of Advances in Intelligent Systems and Computing, page 125-134. Springer, (2017)Obfuscation and Diversification for Securing Cloud Computing., , , , , and . ES, volume 10131 of Lecture Notes in Computer Science, page 179-202. Springer, (2015)