Author of the publication

An Integrated Design Environment for Performance and Dependability Analysis.

, , , , , and . DAC, page 184-189. ACM Press, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guest Editors' Introduction: In Cloud Computing We Trust - But Should We?, and . IEEE Secur. Priv., 8 (6): 14-16 (2010)Security and Privacy for E-business. John Wiley & Sons, Inc., New York, (2001)Saturated adaptive backstepping control of uncertain nonlinear systems with validation using twin rotor system., , and . J. Frankl. Inst., 357 (18): 13477-13510 (2020)A framework for analyzing programs written in proprietary languages., , , , , and . OOPSLA Companion, page 289-300. ACM, (2011)Simple, state-based approaches to program-based anomaly detection, and . ACM Transactions on Information and System Security (TISSEC), (2003)Sandboxing and Virtualization: Modern Tools for Combating Malware., and . IEEE Secur. Priv., 9 (2): 79-82 (2011)An Integrated Design Environment for Performance and Dependability Analysis., , , , , and . DAC, page 184-189. ACM Press, (1997)A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT., and . Recent Advances in Intrusion Detection, (1999)Efficiently tracking application interactions using lightweight virtualization., , , and . VMSec, page 19-28. ACM, (2008)Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites., , and . CollaborateCom, volume 10 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 24-33. Springer / ICST, (2008)