Author of the publication

Information Leakage Detection in Distributed Systems using Software Agent.

, , , and . IEEE IA, page 128-135. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data diodes in support of trustworthy cyber infrastructure., and . CSIIRW, page 23. ACM, (2010)On the Challenges of Effective Movement., , , , and . MTD@CCS, page 41-50. ACM, (2014)MTD'20: 7th ACM Workshop on Moving Target Defense., and . ACM Conference on Computer and Communications Security, page 2137-2138. ACM, (2020)Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity., , , , , , and . ACM Conference on Computer and Communications Security, page 901-913. ACM, (2015)TORTIS: Retry-Free Software Transactional Memory for Real-Time Systems., , , , , , , and . RTSS, page 469-481. IEEE, (2021)Dedicated vs. distributed: A study of mission survivability metrics., , , , and . MILCOM, page 1345-1350. IEEE, (2011)On the Effectiveness of Type-based Control Flow Integrity., , , , , and . ACSAC, page 28-39. ACM, (2018)Performance analysis of binary code protection., and . WSC, page 601-610. IEEE Computer Society, (2005)Preventing Kernel Hacks with HAKCs., , , , , , and . NDSS, The Internet Society, (2022)Causal Analysis for Software-Defined Networking Attacks., , , , , and . USENIX Security Symposium, page 3183-3200. USENIX Association, (2021)