Author of the publication

RDMA-Based Cooperative Caching for a Distributed File System.

, , , , and . ICPADS, page 344-353. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Control of system calls from outside of virtual machines., , and . SAC, page 2116-1221. ACM, (2008)BitVisor: a thin hypervisor for enforcing i/o device security., , , , , , , , , and 4 other author(s). VEE, page 121-130. ACM, (2009)MobileScope: A Programming Language with Objective Mobility., , , and . ICDCS Workshops, page 542-547. IEEE Computer Society, (2004)A 1-Tb 4b/Cell 4-Plane 162-Layer 3D Flash Memory With a 2.4-Gb/s I/O Speed Interface., , , , , , , , , and 39 other author(s). ISSCC, page 130-132. IEEE, (2022)Load-based covert channels between Xen virtual machines., and . SAC, page 173-180. ACM, (2010)Identifying Useful Features for Malware Detection in the Ember Dataset., , and . CANDAR Workshops, page 360-366. IEEE, (2019)Trends of anti-analysis operations of malwares observed in API call logs.. J. Comput. Virol. Hacking Tech., 14 (1): 69-85 (2018)Skipping Sleeps in Dynamic Analysis of Multithreaded Malware.. DSC, page 1-8. IEEE, (2018)Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism., , , , and . AISec@CCS, page 55-56. ACM, (2017)How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement.. DIMVA, volume 11543 of Lecture Notes in Computer Science, page 197-218. Springer, (2019)