Author of the publication

MAPMon: A Host-Based Malware Detection Tool.

, and . PRDC, page 349-356. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multicasting Optical Crossconnects with Fault Tolerance Mechanism and Wavelength Routing in All-Optical Networks., and . ICOIN (1), volume 2343 of Lecture Notes in Computer Science, page 313-326. Springer, (2002)Memory forensics using virtual machine introspection for Malware analysis., , , and . DSC, page 518-519. IEEE, (2017)A framework for the design of error-aware power-efficient fixed-width Booth multipliers., , , , and . ISCAS (1), page 81-84. IEEE, (2005)Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks., , and . VTC Fall, IEEE, (2009)MDP-trees: multi-domain macro placement for ultra large-scale mixed-size designs., , , and . ASP-DAC, page 557-562. ACM, (2019)SPT-based topology algorithm for constructing power efficient wireless ad hoc networks., , and . WWW (Alternate Track Papers & Posters), page 234-235. ACM, (2004)Enhancing bug hunting using high-level symbolic simulation., , , , and . ACM Great Lakes Symposium on VLSI, page 417-420. ACM, (2009)Noninteractive pairwise key establishment for sensor networks., , and . IEEE Trans. Inf. Forensics Secur., 5 (3): 556-569 (2010)Efficient reconfiguration algorithms for degradable VLSI/WSI arrays., and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 11 (10): 1289-1300 (1992)A testing framework for Web application security assessment., , , , , and . Comput. Networks, 48 (5): 739-761 (2005)