Author of the publication

Experience Report: An Analysis of Hypercall Handler Vulnerabilities.

, , , , and . ISSRE, page 100-111. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating the Feasibility Issues of Data Confidentiality Solutions from a Data Warehousing Perspective., , and . DaWaK, volume 7448 of Lecture Notes in Computer Science, page 404-416. Springer, (2012)An Experimental Study of Software Aging and Rejuvenation in Dockerd., and . EDCC, page 1-6. IEEE, (2019)Benchmarking Untrustworthiness: An Alternative to Security Measurement., and . Int. J. Dependable Trust. Inf. Syst., 1 (2): 32-54 (2010)NoSQL Databases: A Software Engineering Perspective., , , , and . WorldCIST (1), volume 353 of Advances in Intelligent Systems and Computing, page 741-750. Springer, (2015)Detecting Malicious SQL., , and . TrustBus, volume 4657 of Lecture Notes in Computer Science, page 259-268. Springer, (2007)EDCC 2012 - Fast Abstracts & Student Forum Proceedings, and . CoRR, (2012)Penetration Testing for Web Services., and . Computer, 47 (2): 30-36 (2014)Editorial: Security and Dependability of Cloud Systems and Services - Part II., and . IEEE Trans. Serv. Comput., 10 (6): 927-928 (2017)A Europe-Brazil Context for Secure Data Analytics in the Cloud., , , , , , and . IEEE Secur. Priv., 16 (6): 52-60 (2018)Availability and reliability modeling of VM migration as rejuvenation on a system under varying workload., , and . Softw. Qual. J., 28 (1): 59-83 (2020)