Author of the publication

T-VMI: Trusted Virtual Machine Introspection in Cloud Environments.

, , and . CCGrid, page 478-487. IEEE Computer Society / ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NFTDisk: Visual Detection of Wash Trading in NFT Markets., , , , and . CHI, page 215:1-215:15. ACM, (2023)Nonbinary LDPC code for noncoherent underwater acoustic communication under non-Gaussian noise., , and . ICSPCC, page 1-6. IEEE, (2017)Describing and Forecasting the Medical Resources assignments for International Disaster Medical relief Forces Using an Injury-Driven Ontology Model., , , , and . ISCRAM, ISCRAM Association, (2019)Automatically Capturing and Reproducing Android Application Crashes., , , , and . QRS Companion, page 524-525. IEEE, (2019)Modeling a Sliding Window Decoder for Spatially Coupled LDPC Codes., , , and . GLOBECOM (Workshops), page 1-6. IEEE, (2021)Braided Convolutional Self-orthogonal Codes with Double Sliding Window Decoding., , , , and . ISTC, page 1-5. IEEE, (2023)Performance Analysis in Multi-Relay DF Cognitive Relay Networks under Nakagami-m fading channels., , , , and . ComComAP, page 1-6. IEEE, (2020)A super-resolution algorithm based on adaptive sparse representation., , , and . FSKD, page 1834-1838. IEEE, (2015)MCRM System: CIM-Based Multiple Clusters Manager., , , and . ISPA Workshops, volume 3759 of Lecture Notes in Computer Science, page 549-558. Springer, (2005)Access Path Based Source Address Validation in Mobile IPv6., , and . NPC, volume 6985 of Lecture Notes in Computer Science, page 334-349. Springer, (2011)