Author of the publication

Demonstrating the effectiveness of MOSES for separation of execution modes.

, , , , and . ACM Conference on Computer and Communications Security, page 998-1000. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Skype & Type: Keyboard Eavesdropping in Voice-over-IP., , , , and . ACM Trans. Priv. Secur., 22 (4): 24:1-24:34 (2019)Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization., , , , , and . IEEE Trans. Serv. Comput., 17 (1): 18-29 (January 2024)ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags., , , , and . Comput. Networks, (2022)NC based DAS-NDN: Network Coding for robust Dynamic Adaptive Streaming over NDN., , and . Comput. Networks, (2020)CrypSH: A Novel IoT Data Protection Scheme Based on BGN Cryptosystem., and . IEEE Trans. Cloud Comput., 10 (4): 2437-2450 (2022)Security and Privacy of Smart Waste Management Systems: A Cyber-Physical System Perspective., , , , and . IEEE Internet Things J., 11 (5): 7309-7324 (2024)A secure alert messaging system for safe driving., , , and . Comput. Commun., (2014)Analysis and classification of context-based malware behavior., , and . Comput. Commun., (2019)BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications., , , , and . Comput. Commun., (2021)A machine learning-based approach to detect threats in bio-cyber DNA storage systems., , , and . Comput. Commun., (2022)