From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Benchmark Dataset and Deep Learning-Based Image Reconstruction for Electrical Capacitance Tomography., , , и . Sensors, 18 (11): 3701 (2018)Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery., , , , , , и . CCS, стр. 341-355. ACM, (2023)DeUEDroid: Detecting Underground Economy Apps Based on UTG Similarity., , , , , , , , , и . ISSTA, стр. 223-235. ACM, (2023)Comprehensive and Efficient Protection of Kernel Control Data., , , , , и . IEEE Trans. Inf. Forensics Secur., 6 (4): 1404-1417 (2011)Transparent Protection of Commodity OS Kernels Using Hardware Virtualization., , , , , , и . SecureComm, том 50 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 162-180. Springer, (2010)Verifying Secure Interface Composition for Component-Based System Designs., , , , и . APSEC (1), стр. 359-366. IEEE Computer Society, (2014)Conductance Sensor With Self-Calibration and Venturi Tube Based Flowrate Measurement for Gas-Water Slug Flow., , , , и . IEEE Trans. Instrum. Meas., (2022)AdCapsule: Practical Confinement of Advertisements in Android Applications., , , и . IEEE Trans. Dependable Secur. Comput., 17 (3): 479-492 (2020)Defeating return-oriented rootkits with "Return-Less" kernels., , , , и . EuroSys, стр. 195-208. ACM, (2010)Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding., , , , , , , и . USENIX Security Symposium, стр. 7517-7534. USENIX Association, (2023)