Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Signature-Based Protection from Code Reuse Attacks., , , , and . IEEE Trans. Computers, 64 (2): 533-546 (2015)A mash-up application utilizing hybridized filtering techniques for recommending events at a social networking site., , and . Soc. Netw. Anal. Min., 1 (3): 231-239 (2011)A Study on the Security Implications of Information Leakages in Container Clouds., , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (1): 174-191 (2021)A Context-Enhanced De-identification System., , , and . CoRR, (2021)Visualization of Patient Prescription History Data in Emergency Care., , and . AMIA, AMIA, (2014)State of the Art of Clinical Narrative Report De-Identification and Its Future., , , and . AMIA, AMIA, (2015)Branch regulation: Low-overhead protection from code reuse attacks., , , and . ISCA, page 94-105. IEEE Computer Society, (2012)Predicting ICU mortality: a comparison of stationary and nonstationary temporal models., , and . AMIA, AMIA, (2000)An Easy-to-Use Clinical Text De-identification Tool for Clinical Scientists: NLM Scrubber., , , , and . AMIA, AMIA, (2015)Semi-Automatic Indexing of Full Text Biomedical Articles., , and . AMIA, AMIA, (2005)