Author of the publication

Enhancing host security using external environment sensors.

, , , , and . Int. J. Inf. Sec., 10 (5): 285-299 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lightweight Binary Authentication System for Windows., , , , and . IFIPTM, volume 263 of IFIP Advances in Information and Communication Technology, page 295-310. Springer, (2008)Enhancing Host Security Using External Environment Sensors., , , , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 362-379. Springer, (2010)Enhancing host security using external environment sensors., , , , and . Int. J. Inf. Sec., 10 (5): 285-299 (2011)Comprehending module dependencies and sharing., , and . ICSE (2), page 89-98. ACM, (2010)978-1-60558-719-6.A MapReduce-Based Maximum-Flow Algorithm for Large Small-World Network Graphs., , and . ICDCS, page 192-202. IEEE Computer Society, (2011)Routing in the Watts and Strogatz Small World Networks Revisited., , and . SASO Workshops, page 247-250. IEEE Computer Society, (2010)Towards a binary integrity system for windows., and . AsiaCCS, page 503-507. ACM, (2011)Simple and Practical Integrity Models for Binaries and Files., and . IFIPTM, volume 454 of IFIP Advances in Information and Communication Technology, page 30-46. Springer, (2015)Security Issues in Small World Network Routing., , and . SASO, page 493-494. IEEE Computer Society, (2008)Wiki credibility enhancement., , and . Int. Sym. Wikis, ACM, (2009)