From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Introduction to CyberWarfare: Offensive and Defensive Software Technologies Minitrack., и . HICSS, стр. 1. ScholarSpace / AIS Electronic Library (AISeL), (2017)Creating Shareable Security Modules., , , и . World Conference on Information Security Education, том 406 из IFIP Advances in Information and Communication Technology, стр. 156-163. Springer, (2011)Investigating the Implications of Virtual Machine Introspection for Digital Forensics., , и . ARES, стр. 1024-1029. IEEE Computer Society, (2009)Using Memory Map Timings to Discover Information Leakage to a Live VM from the Hypervisor., и . SERVICES, стр. 48-52. IEEE Computer Society, (2014)Introduction to the CyberWarfare: Offensive and Defensive Software Technologies Minitrack., и . HICSS, стр. 5560. IEEE Computer Society, (2016)Applying Formal Methods Informally., , и . HICSS, стр. 1-8. IEEE Computer Society, (2011)Promoting Digital Forensics Awareness through the University of Alaska Fairbanks ASSERT Center., , и . HICSS, стр. 265. IEEE Computer Society, (2007)Circumventing cryptography in virtualized environments., и . MALWARE, стр. 32-38. IEEE Computer Society, (2012)A Mutualistic Security Service Model: Supporting Large-Scale Virtualized Environments., , и . IT Prof., 13 (3): 18-23 (2011)Using Virtualization to Create and Deploy Computer Security Lab Exercises., , и . SEC, том 278 из IFIP, стр. 621-635. Springer, (2008)