From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Defeating buffer overflow attacks via virtualization., , , и . Comput. Electr. Eng., 40 (6): 1940-1950 (2014)A Practical Method to Confine Sensitive API Invocations on Commodity Hardware., , , , , и . NSS, том 10394 из Lecture Notes in Computer Science, стр. 145-159. Springer, (2017)MDCHD: A novel malware detection method in cloud using hardware trace and deep learning., , , , , и . Comput. Networks, (2021)FindEvasion: An Effective Environment-Sensitive Malware Detection System for the Cloud., , , , и . ICDF2C, том 216 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 3-17. Springer, (2017)A Virtualization-Based Approach for Application Whitelisting., , , и . IEICE Trans. Inf. Syst., 97-D (6): 1648-1651 (2014)Towards time evolved malware identification using two-head neural network., , , , , и . J. Inf. Secur. Appl., (2022)KEcruiser: A novel control flow protection for kernel extensions., , , и . Future Gener. Comput. Syst., (2019)An Online Approach to Defeating Return-Oriented-Programming Attacks., , , , и . CSS, том 10581 из Lecture Notes in Computer Science, стр. 236-247. Springer, (2017)A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning., , , и . IEEE Access, (2019)VCPEC: Vulnerability Correlation Analysis Based on Privilege Escalation and Coritivity Theory., , , и . ICCNS, стр. 99-108. ACM, (2020)