Author of the publication

Auditing Covert Communication between Applications on Android.

, , , , and . ISPDC, page 257-260. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CloudTB: A quick and reliable testbed for virtual machine based cloud computing systems., , , , and . CONIELECOMP, page 40-47. IEEE, (2015)DRIC: Dependable Grid Computing Framework., , , and . IEICE Trans. Inf. Syst., 89-D (2): 612-623 (2006)Defending Against Flow Table Overloading Attack in Software-Defined Networks., , , , , and . IEEE Trans. Serv. Comput., 12 (2): 231-246 (2019)CloudCFI: Context-Sensitive and Incremental CFI in the Cloud Environment., , , , and . IEEE Trans. Cloud Comput., 9 (3): 938-957 (2021)CloudAC: a cloud-oriented multilayer access control system for logic virtual domain., , , , , and . IET Inf. Secur., 7 (1): 51-59 (2013)Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas., , , , , and . Secur. Commun. Networks, 5 (10): 1169-1180 (2012)A Skip-gram-based Framework to Extract Knowledge from Chinese Reviews in Cloud Environment., , , and . Mob. Networks Appl., 20 (3): 363-369 (2015)Patch-Related Vulnerability Detection Based on Symbolic Execution., , , , , and . IEEE Access, (2017)Research on Group Signature Scheme with Forward Security., , , and . J. Comput. Res. Dev., 43 (12): 2069-2075 (2006)Reliability Analysis for Grid Computing., , , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 787-790. Springer, (2004)