Author of the publication

Reconciling malware labeling discrepancy via consensus learning.

, , , and . ICDE Workshops, page 84-89. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authentikation als Grundlage der Skalierung von Sicherheit in der Kommunikationstechnik.. Kommunikation in Verteilten Systemen, page 62-76. Springer, (1997)Scalable integrity monitoring in virtualized environments., , , and . STC@CCS, page 73-78. ACM, (2010)Passive security intelligence to analyze the security risks of mobile/BYOD activities., , , , , , , , , and . IBM J. Res. Dev., 60 (4): 9 (2016)Trustworthy and personalized computing on public kiosks., , , , , and . MobiSys, page 199-210. ACM, (2008)Design and Implementation of a TCG-based Integrity Measurement Architecture., , , and . USENIX Security Symposium, page 223-238. USENIX, (2004)Attestation-based policy enforcement for remote access., , , and . CCS, page 308-317. ACM, (2004)Linking remote attestation to secure tunnel endpoints., , and . STC, page 21-24. ACM, (2006)MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation., , , , , and . EURASIP J. Information Security, (2014)Security for the cloud infrastructure: Trusted virtual data center implementation., , , , , , , , , and 2 other author(s). IBM J. Res. Dev., 53 (4): 6 (2009)Virtualization and Hardware-Based Security., , and . IEEE Secur. Priv., 6 (5): 24-31 (2008)