Author of the publication

BLADE: an attack-agnostic approach for preventing drive-by malware infections.

, , , and . ACM Conference on Computer and Communications Security, page 440-450. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cooperative communications with relay selection in wireless sensor networks., , , and . IEEE Trans. Consumer Electronics, 55 (2): 513-517 (2009)Robust scareware image detection., , , , and . ICASSP, page 2920-2924. IEEE, (2013)Big data approaches to develop a comprehensive and accurate tool aimed at improving autism spectrum disorder diagnosis and subtype stratification., , , and . Libr. Hi Tech, 38 (4): 819-833 (2020)A Deep Learning-Based Brain Age Prediction Model for Preterm Infants via Neonatal MRI., , , , , , , , , and 4 other author(s). IEEE Access, (2023)Remix: On-demand Live Randomization., , , and . CODASPY, page 50-61. ACM, (2016)D-Box: DMA-enabled Compartmentalization for Embedded Applications., , , , and . NDSS, The Internet Society, (2022)Research on Three-Dimensional Reconstruction of Brain Image Features Based on Augmented Reality Technology., and . ICSH, volume 11924 of Lecture Notes in Computer Science, page 39-47. Springer, (2019)Integrating genomic and resting State fMRI for efficient autism spectrum disorder classification., , , and . Multim. Tools Appl., 81 (14): 19183-19194 (2022)SAVIOR: Towards Bug-Driven Hybrid Testing., , , , , , , and . CoRR, (2019)OEI: Operation Execution Integrity for Embedded Devices., , , and . CoRR, (2018)