From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

COMS: Customer Oriented Migration Service., , , и . CLOUD, стр. 692-695. IEEE Computer Society, (2017)Understanding the Security Implication of Aborting Virtual Machine Live Migration., , , и . IEEE Trans. Cloud Comput., 10 (2): 1275-1286 (2022)HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code., , , и . ICAC, стр. 127-136. IEEE Computer Society, (2016)All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability., , , и . RAID, стр. 623-638. ACM, (2023)Nighthawk: Transparent System Introspection from Ring -3., , , , , и . ESORICS (2), том 11736 из Lecture Notes in Computer Science, стр. 217-238. Springer, (2019)Contextualizing Consensus Protocols in Blockchain: A Short Survey., , , , , и . TPS-ISA, стр. 190-195. IEEE, (2019)Defeating Kernel Driver Purifier., , и . SecureComm, том 164 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 116-134. Springer, (2015)Shadow patching: Minimizing maintenance windows in a virtualized enterprise environment., , , и . CNSM, стр. 169-174. IEEE Computer Society, (2014)Hyperprobe: Towards Virtual Machine Extrospection., , , и . USENIX ATC, USENIX Association, (2016)KShot: Live Kernel Patching with SMM and SGX., , , , , , , и . DSN, стр. 1-13. IEEE, (2020)