Author of the publication

VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach.

, , , and . WKDD, page 594-600. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis and Design of E-voting Protocol., , and . SEC, volume 175 of IFIP Conference Proceedings, page 281-290. Kluwer, (2000)Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?., , , , , , , , and . Peer-to-Peer Computing, page 11-20. IEEE, (2009)A Way of Key Management in Cloud Storage Based on Trusted Computing., , , and . NPC, volume 6985 of Lecture Notes in Computer Science, page 135-145. Springer, (2011)Study on Strand Space Model Theory., , , and . J. Comput. Sci. Technol., 18 (5): 553-570 (2003)A survey and trends on Internet worms., and . Comput. Secur., 24 (4): 334-346 (2005)A dynamic information flow model of secure systems., and . AsiaCCS, page 341-343. ACM, (2007)SecGuard: Secure and Practical Integrity Protection Model for Operating Systems., , , , , and . APWeb, volume 6612 of Lecture Notes in Computer Science, page 370-375. Springer, (2011)SpamClean: Towards Spam-Free Tagging Systems., , , and . CSE (4), page 429-435. IEEE Computer Society, (2009)Some issues regarding operating system security.. ICIS, page 1. IEEE Computer Society, (2014)A hash-TLB approach for MMU virtualization in xen/IA64., , , , , and . IPDPS, page 1-8. IEEE, (2008)