Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WaybackVisor: Hypervisor-Based Scalable Live Forensic Architecture for Timeline Analysis., , , , , and . SpaCCS Workshops, volume 10658 of Lecture Notes in Computer Science, page 219-230. Springer, (2017)Inter-device Communication Paradigm: Requirements Analysis for Its Security Mechanisms., , and . SAINT, page 345-348. IEEE Computer Society, (2008)Application for a Simple Device Authentication Framework: Device Authentication Middleware Using Novel Smart Card Software., , and . SAINT Workshops, page 31. IEEE Computer Society, (2007)BitVisor: a thin hypervisor for enforcing i/o device security., , , , , , , , , and 4 other author(s). VEE, page 121-130. ACM, (2009)Use of Role Based Access Control for Security-Purpose Hypervisors., , and . TrustCom/ISPA/IUCC, page 1613-1619. IEEE Computer Society, (2013)Machine Learning-based Ransomware Detection Using Low-level Memory Access Patterns Obtained From Live-forensic Hypervisor., and . CSR, page 323-330. IEEE, (2022)FIMAR: Fast incremental memory acquisition and restoration system for temporal-dimension forensic analysis., and . Forensic Sci. Int. Digit. Investig., (September 2023)Machine Learning Based Ransomware Detection Using Storage Access Patterns Obtained From Live-forensic Hypervisor., and . IoTSMS, page 393-398. IEEE, (2019)Teaching Expert Development Project by KOSEN Security Educational Community., , , , , , , , , and 6 other author(s). EDUCON, page 1643-1651. IEEE, (2022)A Two-Step Execution Mechanism for Thin Secure Hypervisors., , , , , , , , , and 2 other author(s). SECURWARE, page 129-135. IEEE Computer Society, (2009)