Author of the publication

Flaw and Configuration Analysis of Cloud Component Using First Order Logic.

. AsiaJCIS, page 104-108. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection, and . Cryptology and Network Security, volume 3810 of Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 10.1007/11599371_8.(2005)Faster Parameter Detection of Polymorphic Viral Code Using Hot List Strategy.. ICONIP (1), volume 5506 of Lecture Notes in Computer Science, page 555-562. Springer, (2008)Term-Rewriting Deobfuscation for Static Client-Side Scripting Malware Detection., , and . NTMS, page 1-6. IEEE, (2011)Automated Log Analysis of Infected Windows OS Using Mechanized Reasoning.. ICONIP (2), volume 5864 of Lecture Notes in Computer Science, page 540-547. Springer, (2009)Practical network traffic analysis in P2P environment., , , , and . IWCMC, page 1801-1807. IEEE, (2011)Log Analysis of Exploitation in Cloud Computing Environment Using Automated Reasoning., , and . ICONIP (2), volume 6444 of Lecture Notes in Computer Science, page 337-343. Springer, (2010)Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection., and . CANS, volume 3810 of Lecture Notes in Computer Science, page 85-95. Springer, (2005)Hardening Botnet by a Rational Botmaster., , and . Inscrypt, volume 5487 of Lecture Notes in Computer Science, page 348-369. Springer, (2008)A new perspective of paramodulation complexity by solving massive 8 puzzles., and . CoRR, (2020)Flaw and Configuration Analysis of Cloud Component Using First Order Logic.. AsiaJCIS, page 104-108. IEEE Computer Society, (2012)