From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Proposed Processor Extensions for Significant Speedup of Hypervisor Memory Introspection., , , и . TRUST, том 9229 из Lecture Notes in Computer Science, стр. 249-267. Springer, (2015)Fast switch into a trustworthy virtual machine for running security-sensitive applications., , , , , , и . AQTR, стр. 1-6. IEEE, (2018)Flexible Organization in the OrcFS Relational File System for Efficient File Searching., , и . Scalable Comput. Pract. Exp., (2011)Automatic and Reliable Distribution of Data in Grids over Globus Toolkit., , , и . SYNASC, стр. 310-316. IEEE Computer Society, (2007)VE-VMI: High-Performance Virtual Machine Introspection Based on Virtualization Exception., , , и . ISPDC, стр. 73-80. IEEE, (2021)False Positive Mitigation in Behavioral Malware Detection Using Deep Learning., , и . ICCP, стр. 197-203. IEEE, (2018)File System Minifilter Based Data Leakage Prevention System., и . RoEduNet, стр. 1-6. IEEE, (2018)From Plagiarism to Malware Detection., , и . SYNASC, стр. 227-234. IEEE Computer Society, (2013)Fast creation of short-living virtual machines using copy-on-write RAM-disks.. AQTR, стр. 1-6. IEEE, (2014)Automatic code features extraction using bio-inspired algorithms., , и . J. Comput. Virol. Hacking Tech., 10 (3): 165-176 (2014)