Author of the publication

MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles.

, , , , and . ICDCS, page 642-652. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TweetCred: A Real-time Web-based System for Assessing Credibility of Content on Twitter., , , and . CoRR, (2014)Misinformation in Social Networks, Analyzing Twitter During Crisis Events., and . Encyclopedia of Social Network Analysis and Mining, (2014)DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices., , , and . NSS, volume 9408 of Lecture Notes in Computer Science, page 112-129. Springer, (2015)Identifying and characterizing user communities on Twitter during crisis events., , and . DUBMMSM, page 23-26. ACM, (2012)Using context-profiling to aid access control decisions in mobile devices., , and . PerCom Workshops, page 310-312. IEEE Computer Society, (2011)MedMap: A Concept Mapping Ontology Tool in the Health Sciences Classroom., , , , and . AMIA, AMIA, (2022)Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks., , , and . NSS, volume 7873 of Lecture Notes in Computer Science, page 293-306. Springer, (2013)A secure architecture design based on application isolation, code minimization and randomization., , and . CNS, page 423-429. IEEE, (2013)Semantic approach to automating management of big data privacy policies., , , , , and . IEEE BigData, page 482-491. IEEE Computer Society, (2016)Marlin: making it harder to fish for gadgets., , , and . CCS, page 1016-1018. ACM, (2012)