Author of the publication

Comparing the effectiveness of commercial obfuscators against MATE attacks.

, , , , and . SSPREW@ACSAC, page 8:1-8:11. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Phase space power analysis for PC-based rootkit detection., , , and . ACM Southeast Regional Conference, page 82-90. ACM, (2022)Hector: Automated Task Allocation for MPI., , , and . IPPS, page 344-348. IEEE Computer Society, (1996)Digital video recording onto solid-state disks: feasibility and lifetime estimation., and . IEEE Trans. Consumer Electronics, 57 (2): 558-563 (2011)Packet loss behavior of homeplug AV traffic at video bit rates., and . IEEE Trans. Consumer Electronics, 57 (2): 823-826 (2011)802.11g packet-loss behavior at high sustained bit rates in the home., and . IEEE Trans. Consumer Electronics, 55 (2): 788-791 (2009)Hector: an agent based architecture for dynamic resource management., , , , , , and . IEEE Concurrency, 7 (2): 47-55 (1999)A framework for calculating fundamental DVR performance limits., and . IEEE Trans. Consumer Electronics, 55 (1): 132-138 (2009)Using Hector to run MPI programs over networked workstations., , , , , and . Concurr. Pract. Exp., 11 (4): 189-204 (1999)An artificial immune system model for intelligent agents., , , and . Future Gener. Comput. Syst., 17 (4): 335-343 (2001)Effectiveness of Adversarial Component Recovery in Protected Netlist Circuit Designs., , , and . SECRYPT, page 181-192. SCITEPRESS, (2022)