Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Virtualization-Based Approach for Application Whitelisting., , , and . IEICE Trans. Inf. Syst., 97-D (6): 1648-1651 (2014)A Practical Method to Confine Sensitive API Invocations on Commodity Hardware., , , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 145-159. Springer, (2017)Detection of Malicious Domains in APT via Mining Massive DNS Logs., , , , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 140-152. Springer, (2020)Cross-Project Software Defect Prediction Based on Feature Selection and Transfer Learning., , and . ML4CS (3), volume 12488 of Lecture Notes in Computer Science, page 363-371. Springer, (2020)APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework., , , , and . Inf. Sci., (2021)Bypassing software-based remote attestation using debug registers., , , , , , and . Connect. Sci., (2024)The Acoustic System of the Fendouzhe HOV., , , , , , , , , and 1 other author(s). Sensors, 21 (22): 7478 (2021)Defending Application Layer DDoS Attacks via Multidimensional Parallelotope., , , , , , and . Secur. Commun. Networks, (2020)Online Teaching of Computer Fundamentals Course During the Pandemic., , and . ICCSE (3), volume 1813 of Communications in Computer and Information Science, page 410-422. Springer, (2022)A Context-Aware Trust Establishment and Mapping Framework for Web Applications., , , , , and . CIS, page 892-896. IEEE Computer Society, (2007)