Author of the publication

A framework for analyzing programs written in proprietary languages.

, , , , , and . OOPSLA Companion, page 289-300. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and Privacy for E-business. John Wiley & Sons, Inc., New York, (2001)A framework for analyzing programs written in proprietary languages., , , , , and . OOPSLA Companion, page 289-300. ACM, (2011)Guest Editors' Introduction: In Cloud Computing We Trust - But Should We?, and . IEEE Secur. Priv., 8 (6): 14-16 (2010)An Integrated Design Environment for Performance and Dependability Analysis., , , , , and . DAC, page 184-189. ACM Press, (1997)Simple, state-based approaches to program-based anomaly detection, and . Transactions on Information and System Security (TISSEC), 5 (3): 203--237 (August 2002)Simple, state-based approaches to program-based anomaly detection, and . ACM Transactions on Information and System Security (TISSEC), (2003)Analyzing the Performance of Program Behavior Profiling for Intrusion Detection., and . DBSec, volume 171 of IFIP Conference Proceedings, page 19-32. Kluwer, (1999)Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services., and . NCA, page 114-117. IEEE Computer Society, (2009)The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security., , , , , , , , and . SysSec@DIMVA, page 53-56. IEEE, (2011)Sender Side Intelligence for TCP Throughput Enhancement in Wired-Cum-Wireless Network., , , and . PIMRC, page 1-5. IEEE, (2007)