Author of the publication

Defeating buffer overflow attacks via virtualization.

, , , and . Comput. Electr. Eng., 40 (6): 1940-1950 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DEPLEST: A blockchain-based privacy-preserving distributed database toward user behaviors in social networks., , , , and . Inf. Sci., (2019)Defeating buffer overflow attacks via virtualization., , , and . Comput. Electr. Eng., 40 (6): 1940-1950 (2014)Software structure characteristic measurement method based on weighted network., , , , and . Comput. Networks, (2019)A Virtualization-Based Approach for Application Whitelisting., , , and . IEICE Trans. Inf. Syst., 97-D (6): 1648-1651 (2014)Binary Oriented Vulnerability Analyzer Based on Hidden Markov Model., , , , and . IEICE Trans. Inf. Syst., 93-D (12): 3410-3413 (2010)MaliCage: A packed malware family classification framework based on DNN and GAN., , , and . J. Inf. Secur. Appl., (2022)Security Feature Measurement for Frequent Dynamic Execution Paths in Software System., , , , , and . Secur. Commun. Networks, (2018)MDCHD: A novel malware detection method in cloud using hardware trace and deep learning., , , , , and . Comput. Networks, (2021)A Practical Method to Confine Sensitive API Invocations on Commodity Hardware., , , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 145-159. Springer, (2017)A Quantitative Method for Evaluating Network Security Based on Attack Graph., , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 349-358. Springer, (2017)