Author of the publication

Learning Execution Contexts from System Call Distribution for Anomaly Detection in Smart Embedded System.

, , , , and . IoTDI, page 191-196. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blinder: Partition-Oblivious Hierarchical Scheduling., , , , and . USENIX Security Symposium, page 2417-2434. USENIX Association, (2021)ABC: Abstract prediction Before Concreteness., , , and . DATE, page 1103-1108. IEEE, (2020)Optimizing Tunable WCET with Shared Resource Allocation and Arbitration in Hard Real-Time Multicore Systems., , and . RTSS, page 227-238. IEEE Computer Society, (2011)ADLP: Accountable Data Logging Protocol for Publish-Subscribe Communication Systems., and . ICDCS, page 1149-1160. IEEE, (2019)Secure and dependable cyber-physical system architectures. University of Illinois Urbana-Champaign, USA, (2017)AccountNet: Accountable Data Propagation Using Verifiable Peer Shuffling.. ICDCS, page 48-61. IEEE, (2023)SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems., , , , and . IEEE Real-Time and Embedded Technology and Applications Symposium, page 21-32. IEEE Computer Society, (2013)TaskShuffler: A Schedule Randomization Protocol for Obfuscation against Timing Inference Attacks in Real-Time Systems., , , and . RTAS, page 111-122. IEEE Computer Society, (2016)Real-Time Systems Security through Scheduler Constraints., , , and . ECRTS, page 129-140. IEEE Computer Society, (2014)Sensor Placement for 3-Coverage with Minimum Separation Requirements., , , and . DCOSS, volume 5067 of Lecture Notes in Computer Science, page 266-281. Springer, (2008)