Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing a secure setuid program., and . Parallel and Distributed Computing and Networks, page 301-309. IASTED/ACTA Press, (2004)Detection of DGA-based Malware Communications from DoH Traffic Using Machine Learning Analysis., , , , and . CCNC, page 224-229. IEEE, (2023)CAP-VMs: Capability-Based Isolation and Sharing in the Cloud., , , , and . OSDI, page 597-612. USENIX Association, (2022)Deriving optimal deep learning models for image-based malware classification., and . SAC, page 1727-1731. ACM, (2022)Exploiting Sub-page Write Protection for VM Live Migration., and . CLOUD, page 484-490. IEEE, (2021)Short Paper: Highly Compatible Fast Container Startup with Lazy Layer Pull., and . IC2E, page 53-59. IEEE, (2021)BitVisor: a thin hypervisor for enforcing i/o device security., , , , , , , , , and 4 other author(s). VEE, page 121-130. ACM, (2009)Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains., , and . ISSS, volume 2609 of Lecture Notes in Computer Science, page 172-184. Springer, (2002)Practical Quick File Server Migration., , and . ACM Trans. Storage, 16 (2): 13:1-13:30 (2020)Transparent VPN failure recovery with virtualization., , , , and . Future Gener. Comput. Syst., 28 (1): 78-84 (2012)