Author of the publication

One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.

, , , and . NDSS, The Internet Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Modeling of Autonomous Systems: A Survey., , , and . ACM Comput. Surv., 52 (5): 91:1-91:34 (2019)One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments., , , and . NDSS, The Internet Society, (2005)A Deep Learning Approach for Network Intrusion Detection System., , , and . BICT, page 21-26. ICST/ACM, (2015)Normal and anomalous traffic flow pattern analysis for organizational networks., , , and . CCECE, page 1-4. IEEE, (2017)Security Enhancement of Over-the-Air Update for Connected Vehicles., , , and . WASA, volume 10874 of Lecture Notes in Computer Science, page 853-864. Springer, (2018)Early Detection of Host-based Intrusions in Linux Environment., , , and . EIT, page 475-479. IEEE, (2020)Practical Proactive Integrity Preservation: A Basis for Malware Defense., , , and . SP, page 248-262. IEEE Computer Society, (2008)A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN), , and . CoRR, (2016)A Novel Key Exchange Protocol using Logic Algebra for the Factorization Problem., , , and . ICISSP, page 396-403. SCITEPRESS, (2022)Efficient trust node aware routing in ZigBee communication network of smart grid., , and . A-SSCC, page 321-326. IEEE, (2012)