Author of the publication

Policykeeper: Recommending Proper Security Mechanisms Based on the Severity of Vulnerability Considering User Experience.

, , , and . SERE (Companion), page 227-228. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and Automatic Instrumentation for Packed Binaries., , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 307-316. Springer, (2009)A Multimodal Image Registration and Fusion Methodology Applied to Drug Discovery Research., , , , and . MMSP, page 324-327. IEEE, (2007)hGuard: A Framework to Measure Hypervisor Critical Files., , , , and . SERE (Companion), page 176-181. IEEE, (2013)Rio: a personal storage system in multi-device and cloud., , and . J. Supercomput., 76 (4): 2315-2338 (2020)Correction to: Rio: a personal storage system in multi-device and cloud., , and . J. Supercomput., 76 (9): 7519 (2020)V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing., , , , , , , , and . CCS, page 2197-2213. ACM, (2021)Novel Adaptive DNN Partitioning Method Based on Image-Stream Pipeline Inference between the Edge and Cloud., , , , and . CNIOT, page 75-82. IEEE, (2022)TeleRobot: Design and Implementation of a Live Remote Interaction Platform for Robots*., , , , , , and . SMC, page 408-412. IEEE, (2023)Channel Replay Aided Modulation Classification of Underwater Acoustic Communication Signals., , , , and . ICCC Workshops, page 228-232. IEEE, (2021)Attention Convolutional Binary Neural Tree for Fine-Grained Visual Categorization., , , , , , , and . CVPR, page 10465-10474. Computer Vision Foundation / IEEE, (2020)