Author of the publication

Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor.

, , , , , , , , and . IEEE Trans. Computers, 69 (11): 1571-1583 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-Time Remote Attestation with Privacy Protection., and . TrustBus, volume 6264 of Lecture Notes in Computer Science, page 81-92. Springer, (2010)AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities., , , and . ICICS, volume 11999 of Lecture Notes in Computer Science, page 341-356. Springer, (2019)Embedding Learning with Heterogeneous Event Sequence for Insider Threat Detection., , , and . ICTAI, page 947-954. IEEE, (2019)Towards Heap-Based Memory Corruption Discovery., , , and . MSN, page 502-511. IEEE, (2021)DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting., , , , and . SecureComm (1), volume 398 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-24. Springer, (2021)AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs., , , , , , and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 510-528. Springer, (2022)Real-time remote attestation of IaaS cloud., , and . CCIS, page 292-297. IEEE, (2012)Towards Open World Traffic Classification., , , , and . ICICS (1), volume 12918 of Lecture Notes in Computer Science, page 331-347. Springer, (2021)Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment., , and . Int. J. Distributed Sens. Networks, (2020)Subspace clustering via graph auto-encoder network for unknown encrypted traffic recognition., , , and . Cybersecur., 5 (1): 29 (2022)