From post

BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection.

, , , , , и . RAID, том 6307 из Lecture Notes in Computer Science, стр. 118-137. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Computational Decoys for Cloud Security., , и . Secure Cloud Computing, Springer, (2014)Worm Propagation Strategies in an IPv6 Internet., , и . login Usenix Mag., (2006)On the General Applicability of Instruction-Set Randomization., , , , и . IEEE Trans. Dependable Secur. Comput., 7 (3): 255-270 (2010)Randomized Instruction Sets and Runtime Environments Past Research and Future Directions.. IEEE Secur. Priv., 7 (1): 18-25 (2009)The dual receiver cryptosystem and its applications., , , и . CCS, стр. 330-343. ACM, (2004)Efficient, DoS-resistant, secure key exchange for internet protocols., , , , , , и . ACM Conference on Computer and Communications Security, стр. 48-58. ACM, (2002)How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints., , , и . ACM Trans. Priv. Secur., 19 (1): 2:1-2:31 (2016)Detection and analysis of eavesdropping in anonymous communication networks., , , и . Int. J. Inf. Sec., 14 (3): 205-220 (2015)Privacy as an Operating System Service., , и . HotSec, USENIX Association, (2006)Transparent ROP Exploit Mitigation Using Indirect Branch Tracing., , и . USENIX Security Symposium, стр. 447-462. USENIX Association, (2013)