Author of the publication

Countering Persistent Kernel Rootkits through Systematic Hook Discovery.

, , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 21-38. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The impact of China's WTO accession on patterns of world trade. Journal of Policy Modeling, 25 (1): 1--41 (January 2003)Options and impact of China's pension reform: a?computable general equilibrium analysis, , , and . Journal of Comparative Economics, 32 (1): 105--127 (March 2004)Exploring scientists' working timetable: Do scientists often work overtime?, , , , , , and . J. Informetrics, 6 (4): 655-660 (2012)Triangular-prism-based algorithm on urban flood inundation simulation by employing dichotomy numerical solution., , , , and . IGARSS, page 790-793. IEEE, (2013)Threshold Plasticity of Hybrid Sİ-VO2 Microring Resonators., , , , , , , and . OFC, page 1-3. IEEE, (2020)Second-Order Dynamic Sliding-Mode Control for Nonminimum Phase Underactuated Hypersonic Vehicles., , and . IEEE Trans. Ind. Electron., 64 (4): 3105-3112 (2017)Novel closed-form auxiliary variables based algorithms for sensor node localization using AOA., , and . ICASSP, page 1414-1418. IEEE, (2014)Process out-grafting: an efficient öut-of-VM" approach for fine-grained process execution monitoring., , , and . ACM Conference on Computer and Communications Security, page 363-374. ACM, (2011)ARMlock: Hardware-based Fault Isolation for ARM., , , and . ACM Conference on Computer and Communications Security, page 558-569. ACM, (2014)HyperSentry: enabling stealthy in-context measurement of hypervisor integrity., , , , , and . ACM Conference on Computer and Communications Security, page 38-49. ACM, (2010)