Author of the publication

Functional polymorphism for intellectual property protection.

, , , , and . HOST, page 61-66. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Systems Approach to Cyber Assurance Education., and . InfoSecCD, page 13-19. ACM, (2013)A Java based component identification tool for measuring the strength of circuit protections., , , and . CSIIRW, page 26. ACM, (2010)Evaluating component hiding techniques in circuit topologies., , , and . ICC, page 1138-1143. IEEE, (2012)Software Security and Randomization through Program Partitioning and Circuit Variation., , and . MTD@CCS, page 79-86. ACM, (2014)A Method for Developing Abuse Cases and Its Evaluation., , , and . J. Softw., 11 (5): 520-527 (2016)Introduction to the Minitrack on Cyber Operations, Defense, and Forensics., , and . HICSS, page 6601-6602. ScholarSpace, (2023)Phase space power analysis for PC-based rootkit detection., , , and . ACM Southeast Regional Conference, page 82-90. ACM, (2022)Mobile Agent Data Integrity Using Multi-agent Architecture., , and . PDCS, page 536-542. ISCA, (2004)Enhanced Operating System Protection to Support Digital Forensic Investigations., , , , and . TrustCom/BigDataSE/ICESS, page 650-659. IEEE Computer Society, (2017)Foundations for Security Aware Software Development Education., and . HICSS, IEEE Computer Society, (2006)