Author of the publication

Curtain: Keep Your Hosts Away from USB Attacks.

, , and . ISC, volume 10599 of Lecture Notes in Computer Science, page 455-471. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust-Aware sensing Quality estimation for team Crowdsourcing in social IoT., , , , and . Comput. Networks, (2021)Social Bots Detection on Mobile Social Networks., and . Int. J. Netw. Secur., 19 (1): 163-166 (2017)Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table., , and . Trustcom/BigDataSE/ISPA, page 394-401. IEEE, (2016)An Adaptive Service Strategy Based on User Rating in P2P., , , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 860-870. Springer, (2005)A Longitudinal Investigation of the Efficacy of Supported In-Home Post-Stroke Rehabilitation., , , , and . IEEE Access, (2020)A Worm Containment Model Based on Neighbor-Alarm., , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 449-457. Springer, (2007)Malware Behavior Capturing Based on Taint Propagation and Stack Backtracing., , and . TrustCom, page 328-335. IEEE Computer Society, (2011)PerformTrust: Trust model integrated past and current performance in P2P file sharing systems., , , and . AICCSA, page 718-725. IEEE Computer Society, (2008)EavesDroid: Eavesdropping User Behaviors via OS Side Channels on Smartphones., , and . IEEE Internet Things J., 11 (3): 3979-3993 (February 2024)Control Flow Integrity Enforcement with Dynamic Code Optimization., , , and . ISC, volume 9866 of Lecture Notes in Computer Science, page 366-385. Springer, (2016)