From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Directed Multicut with linearly ordered terminals., , , и . CoRR, (2014)All Your PC Are Belong to Us: Exploiting Non-control-Transfer Instruction BTB Updates for Dynamic PC Extraction., , и . ISCA, стр. 65:1-65:14. ACM, (2023)Support for the File System Security Requirements of Computational E-Mail Systems., и . CCS, стр. 1-9. ACM, (1994)Security-as-a-Service for Microservices-Based Cloud Applications., , и . CloudCom, стр. 50-57. IEEE Computer Society, (2015)Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor., , , , , , , и . ACSAC, стр. 276-285. IEEE Computer Society, (2005)Lightweight kernel isolation with virtualization and VM functions., , , , и . VEE, стр. 157-171. ACM, (2020)A diagnosis based intrusion detection approach., , , , , и . MILCOM, стр. 929-934. IEEE, (2015)PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage., , , , , , , и . CoRR, (2023)An access control model for simplifying constraint expression., и . ACM Conference on Computer and Communications Security, стр. 154-163. ACM, (2000)Outlook: Cloudy with a Chance of Security Challenges and Improvements., и . IEEE Secur. Priv., 8 (1): 77-80 (2010)