Author of the publication

An Approach to Autonomizing Legacy Systems

, , , , and . Workshop on Self-Healing, Adaptive and Self-MANaged Systems, (June 2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach to Autonomizing Legacy Systems, , , , and . Workshop on Self-Healing, Adaptive and Self-MANaged Systems, (June 2002)Countering code-injection attacks with instruction-set randomization., , and . ACM Conference on Computer and Communications Security, page 272-280. ACM, (2003)Preventing Attacks on Machine Readable Travel Documents (MRTDs)., and . IACR Cryptology ePrint Archive, (2005)A Case Study in Software Adaptation, , and . Workshop on Self-Healing Systems, (November 2002)On the General Applicability of Instruction-Set Randomization., , , , and . IEEE Trans. Dependable Secur. Comput., 7 (3): 255-270 (2010)A Mobile Agent Approach to Process-Based Dynamic Adaptation of Complex Software Systems., , and . EWSPT, volume 2077 of Lecture Notes in Computer Science, page 102-116. Springer, (2001)Privacy is essential for secure mobile devices., , and . IBM J. Res. Dev., 53 (2): 5 (2009)An Active Events Model for Systems Monitoring, , , , and . Working Conference on complex and Dynamic Systems Architecture, (2001)e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing., and . ACSAC, page 286-302. IEEE Computer Society, (2005)