Author of the publication

Kernel Code Integrity Protection Based on a Virtualized Memory Architecture.

, , , and . Comput. Informatics, 32 (2): 295-311 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Moderating Effect of Legitimacy and Reputation on SMEs in a B2B Environment., , , , and . CEC, page 49-56. IEEE Computer Society, (2012)GPSA: A Graph Processing System with Actors., , , , , , and . ICPP, page 709-718. IEEE Computer Society, (2015)Insecure JavaScript Detection and Analysis with Browser-Enforced Embedded Rules., , and . PDCAT, page 393-398. IEEE Computer Society, (2010)Analysis of large-scale topological properties for peer-to-peer networks., , , , and . CCGRID, page 27-34. IEEE Computer Society, (2004)A Fuzzy Data Mining Based Intrusion Detection Model., , , and . FTDCS, page 191-197. IEEE Computer Society, (2004)Server Scheduling Scheme for Asynchronous Cluster Video Server., , , and . AINA, page 509-513. IEEE Computer Society, (2003)Dynamical behavior for stochastic lattice systems, and . Chaos, Solitons & Fractals, 27 (4): 1080--1090 (February 2006)A Risk-Sensitive Intrusion Detection Model., , , and . ICISC, volume 2587 of Lecture Notes in Computer Science, page 107-117. Springer, (2002)A Study of Overflow Vulnerabilities on GPUs., , and . NPC, volume 9966 of Lecture Notes in Computer Science, page 103-115. (2016)A Data Mining Based Intrusion Detection Model., , , , and . IDEAL, volume 2690 of Lecture Notes in Computer Science, page 677-684. Springer, (2003)