Author of the publication

RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment.

, , , and . ESORICS (2), volume 8713 of Lecture Notes in Computer Science, page 475-493. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Deep Joint Network for Session-based News Recommendations with Contextual Augmentation., , and . HT, page 201-209. ACM, (2018)Saliency-Based Centernet for Ship Detection in SAR Images., , , and . IGARSS, page 1552-1555. IEEE, (2022)A Unified Platform for Information Extraction with Two-Stage Process., , , , , and . NLPCC (2), volume 13029 of Lecture Notes in Computer Science, page 509-518. Springer, (2021)In-Orbit Calibration and Validation of HY-2B Altimeter using an Improved Transponder., , , , and . IGARSS, page 5819-5822. IEEE, (2020)Feature Enhancement and Foreground-Background Separation for Weakly Supervised Temporal Action Localization., , , and . MMAsia, page 50:1-50:7. ACM, (2023)Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions., , and . NDSS, The Internet Society, (2011)Attacks on ML Systems: From Security Analysis to Attack Mitigation., , , , and . ICISS, volume 13784 of Lecture Notes in Computer Science, page 119-138. Springer, (2022)Experience-based cyber situation recognition using relaxable logic patterns., , , and . CogSIMA, page 243-250. IEEE, (2012)Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring., , , , and . NDSS, The Internet Society, (2012)WindowGuard: Systematic Protection of GUI Security in Android., , and . NDSS, The Internet Society, (2017)