From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Threat-Based Security Analysis for the Internet of Things., и . SIoT, стр. 35-43. IEEE Computer Society, (2014)Partitioning the trusted computing base of applications on commodity systems.. University of Oxford, UK, (2017)British Library, EThOS.Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home., , и . HCI (20), том 9750 из Lecture Notes in Computer Science, стр. 255-267. Springer, (2016)IO-Trust: An out-of-band trusted memory acquisition for intrusion detection and Forensics investigations in cloud IOMMU based systems., , и . ARES, стр. 45:1-45:6. ACM, (2019)DL2Fence: Integrating Deep Learning and Frame Fusion for Enhanced Detection and Localization of Refined Denial-of-Service in Large-Scale NoCs., , , и . CoRR, (2024)AuDroid: Preventing Attacks on Audio Channels in Mobile Devices., , , и . ACSAC, стр. 181-190. ACM, (2015)Forensic analysis of Tor in Windows environment: A case study., , и . ARES, стр. 156:1-156:10. ACM, (2022)One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices., , , , , и . SP, стр. 3346-3364. IEEE, (2024)Analysis of Trusted Execution Environment usage in Samsung KNOX., , , , и . SysTEX@Middleware, стр. 7:1-7:6. ACM, (2016)EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs., , , , , и . USENIX Security Symposium, стр. 567-584. USENIX Association, (2019)