Author of the publication

A novel malware for subversion of self-protection in anti-virus.

, and . Softw. Pract. Exp., 46 (3): 361-379 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Authorization Architecture for Web Services., and . DBSec, volume 3654 of Lecture Notes in Computer Science, page 222-236. Springer, (2005)A language for specifying sequences of authorization transformations and its applications., and . ICICS, volume 1334 of Lecture Notes in Computer Science, page 39-49. Springer, (1997)An Authorization Model for E-consent Requirement in a Health Care Application., and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 191-205. Springer, (2003)Logic-Based Reasoning on Delegatable Authorizations., , and . ISMIS, volume 2366 of Lecture Notes in Computer Science, page 185-193. Springer, (2002)Robust and Secure Broadcasting., and . INDOCRYPT, volume 2247 of Lecture Notes in Computer Science, page 223-231. Springer, (2001)Decentralized Temporal Authorization Administration., and . DEXA, volume 2736 of Lecture Notes in Computer Science, page 917-926. Springer, (2003)A Fair Electronic Cash Scheme., , and . ISEC, volume 2040 of Lecture Notes in Computer Science, page 20-32. Springer, (2001)Efficient secure group management for SSM., and . ICC, page 1436-1440. IEEE, (2004)Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples., and . CoRR, (2019)MobileTrust: a trust enhanced security architecture for mobile agent systems., and . Int. J. Inf. Sec., 9 (3): 153-178 (2010)