Author of the publication

Large-Scale Automated Software Diversity - Program Evolution Redux.

, , , , , and . IEEE Trans. Dependable Secur. Comput., 14 (2): 158-171 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-variant program execution for vulnerability detection and analysis., , and . CSIIRW, page 38. ACM, (2010)Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space., , , and . EuroSys, page 33-46. ACM, (2009)Runtime Defense against Code Injection Attacks Using Replicated Execution., , , , and . IEEE Trans. Dependable Secur. Comput., 8 (4): 588-601 (2011)Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities., , , , , and . CISIS, page 843-848. IEEE Computer Society, (2008)Inspecting designs in the context of model-driven development., , , , , and . CASCON, page 337-340. IBM, (2006)Examining brain structures associated with perceived stress in a large sample of young adults via voxel-based morphometry., , , , , , and . NeuroImage, (2014)El Niño Effects on the Dynamics and Control of An Island Ecosystem in the Gulf of California NIRO EFFECTS ON THE DYNAMICS AND CONTROL OF AN, , , , , and . Ecology, 78 (6): 1884--1897 (1997)Memory Analysis of Solid Model Representations for Heterogeneous Objects., , , and . J. Comput. Inf. Sci. Eng., 2 (1): 1-10 (2002)Vehicle speed estimation using a monocular camera., , , , and . Video Surveillance and Transportation Imaging Applications, volume 9407 of SPIE Proceedings, page 940704. SPIE, (2015)