Author of the publication

A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boosting performance in attack intention recognition by integrating multiple techniques., , , , and . Frontiers Comput. Sci. China, 5 (1): 109-118 (2011)A Practical Method to Confine Sensitive API Invocations on Commodity Hardware., , , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 145-159. Springer, (2017)A Quantitative Method for Evaluating Network Security Based on Attack Graph., , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 349-358. Springer, (2017)SulleyEX: A Fuzzer for Stateful Network Protocol., , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 359-372. Springer, (2017)DEPLEST: A blockchain-based privacy-preserving distributed database toward user behaviors in social networks., , , , and . Inf. Sci., (2019)Software structure characteristic measurement method based on weighted network., , , , and . Comput. Networks, (2019)Defeating buffer overflow attacks via virtualization., , , and . Comput. Electr. Eng., 40 (6): 1940-1950 (2014)Binary Oriented Vulnerability Analyzer Based on Hidden Markov Model., , , , and . IEICE Trans. Inf. Syst., 93-D (12): 3410-3413 (2010)A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments., , and . Secur. Commun. Networks, (2018)A Virtualization-Based Approach for Application Whitelisting., , , and . IEICE Trans. Inf. Syst., 97-D (6): 1648-1651 (2014)