From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Q-Floid: Android Malware detection with Quantitative Data Flow Graphs., , , и . SG-CRC, том 14 из Cryptology and Information Security Series, стр. 13-25. IOS Press, (2016)An architecture for enforcing end-to-end access control over web applications., , , , , , , и . SACMAT, стр. 163-172. ACM, (2010)Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer., , , , , и . SPACE, том 9354 из Lecture Notes in Computer Science, стр. 55-74. Springer, (2015)Analysis of virtual machine system policies., , и . SACMAT, стр. 227-236. ACM, (2009)Integrity walls: finding attack surfaces from mandatory access control policies., , , , и . AsiaCCS, стр. 75-76. ACM, (2012)Flexible security configuration for virtual machines., , и . CSAW, стр. 35-44. ACM, (2008)Cut me some security., , , и . SafeConfig, стр. 75-78. ACM, (2010)Verifying Compliance of Trusted Programs., , и . USENIX Security Symposium, стр. 321-334. USENIX Association, (2008)From Trusted to Secure: Building and Executing Applications That Enforce System Security., , , и . USENIX ATC, стр. 205-218. USENIX, (2007)Flowfence: a denial of service defense system for software defined networking., , , и . GIIS, стр. 1-6. IEEE, (2015)