Author of the publication

Hiding "real" machine from attackers and malware with a minimal virtual machine monitor.

, , and . SecureComm, page 21. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Learning-based Cooperative Trail Following for Multi-Robot System., , , and . IJCNN, page 1-8. IEEE, (2018)A dataset of duplicate pull-requests in github., , , , and . MSR, page 22-25. ACM, (2018)Unsupervised Voice-Face Representation Learning by Cross-Modal Prototype Contrast., , , , , , and . IJCAI, page 3787-3794. ijcai.org, (2022)Using Configuration Semantic Features and Machine Learning Algorithms to Predict Build Result in Cloud-Based Container Environment., , , , , and . ICPADS, page 248-255. IEEE, (2020)DevRec: A Developer Recommendation System for Open Source Repositories., , , , , and . ICSR, volume 10221 of Lecture Notes in Computer Science, page 3-11. (2017)One size does not fit all: an empirical study of containerized continuous deployment workflows., , , and . ESEC/SIGSOFT FSE, page 295-306. ACM, (2018)AT-PAM: an authentication trustworthiness-based PAM., , and . InfoSecu, page 204-209. ACM, (2004)Data consistency in a large-scale runtime infrastructure., , and . WSC, page 1787-1794. IEEE Computer Society, (2005)Dockerfile Changes in Practice: A Large-Scale Empirical Study of 4, 110 Projects on GitHub., , , and . APSEC, page 247-256. IEEE, (2020)Meta learning based audio tagging., , , , , , and . DCASE, page 193-196. (2018)