Author of the publication

Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks.

, , , , , , and . NOMS, page 121-128. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network., , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 96-107. Springer, (2005)The implementation of data storage and analytics platform for big data lake of electricity usage with spark., , , and . J. Supercomput., 77 (6): 5934-5959 (2021)On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies., , and . NOMS (1), page 277-290. IEEE, (2004)Attacking Strategies and Temporal Analysis Involving Facebook Discussion Groups., , , , , , and . CoRR, (2018)More or Less? Predict the Social Influence of Malicious URLs on Social Media., , , , , , , and . CoRR, (2018)Measuring Message Propagation and Social Influence on Twitter.com., and . SocInfo, volume 6430 of Lecture Notes in Computer Science, page 216-231. Springer, (2010)iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks., , , and . INFOCOM, page 968-976. IEEE, (2008)A property oriented fault detection approach for link state routing protocol., , and . ICCCN, page 114-119. IEEE, (2000)Intrusion detection for link state routing protocol through integrated network management., , , and . ICCCN, page 634-639. IEEE, (1999)MELDing transactions and objects., , and . OOPSLA/ECOOP Workshop on Object-based Concurrent Programming, page 94-98. ACM, (1990)