From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysis of Security in Modern Container Platforms., , , и . Research Advances in Cloud Computing, Springer, (2017)An interface diversified honeypot for malware analysis., , и . ECSA Workshops, стр. 29. ACM, (2016)Security in container-based virtualization through vTPM., , и . UCC, стр. 214-219. ACM, (2016)A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification., , , , , , и . NordSec, том 10014 из Lecture Notes in Computer Science, стр. 152-168. (2016)Diversification and obfuscation techniques for software security: A systematic literature review., , , , , , и . Inf. Softw. Technol., (2018)Internal Interface Diversification as a Security Measure in Sensor Networks., , , , , , и . J. Sens. Actuator Networks, 7 (1): 12 (2018)A Survey on Application Sandboxing Techniques., , и . CompSysTech, стр. 141-148. ACM, (2017)Symbol diversification of linux binaries., , , , , и . WorldCIS, стр. 74-79. IEEE, (2014)A Survey on Anti-honeypot and Anti-introspection Methods., , , и . WorldCIST (2), том 570 из Advances in Intelligent Systems and Computing, стр. 125-134. Springer, (2017)Obfuscation and Diversification for Securing Cloud Computing., , , , , и . ES, том 10131 из Lecture Notes in Computer Science, стр. 179-202. Springer, (2015)