Author of the publication

Monitoring Translation Lookahead Buffers to Detect Code Injection Attacks.

, , , , and . Computer, 47 (7): 66-72 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New S/Key System against Dictionary Attack: A Case Study in Casper and CSP/FDR., and . VVEIS, page 75-77. INSTICC Press, (2004)Partially trained neural networks with self-localizing capability for function approximations., and . Neural Parallel & Scientific Comp., 3 (1): 35-49 (1995)RFID Privacy Protection Scheme for Secure Ubiquitous Computing., , and . IWRT, page 117-124. INSTICC PRESS, (2007)Erratum to: Visual tracking in complex scenes through pixel-wise tri-modeling., , , and . Mach. Vis. Appl., 26 (7-8): 1095 (2015)Geometric one-class classifiers using hyper-rectangles for knowledge extraction., , , and . Expert Syst. Appl., (2019)Pattern generation for multi-class LAD using iterative genetic algorithm with flexible chromosomes and multiple populations., and . Expert Syst. Appl., 42 (2): 833-843 (2015)Feature Extraction Using Class-Augmented Principal Component Analysis (CA-PCA)., , and . ICANN (2), volume 4132 of Lecture Notes in Computer Science, page 606-615. Springer, (2006)Automatic Visual Data Management System., , , and . ICEC, volume 3166 of Lecture Notes in Computer Science, page 579-585. Springer, (2004)Density-Aware Pedestrian Proposal Networks for Robust People Detection in Crowded Scenes., , , and . ECCV Workshops (2), volume 9914 of Lecture Notes in Computer Science, page 643-654. (2016)A behavior combination generating method for reflecting emotional probabilities using simulated annealing algorithm., , , and . RO-MAN, page 192-197. IEEE, (2011)