Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Faster Parameter Detection of Polymorphic Viral Code Using Hot List Strategy.. ICONIP (1), volume 5506 of Lecture Notes in Computer Science, page 555-562. Springer, (2008)Term-Rewriting Deobfuscation for Static Client-Side Scripting Malware Detection., , and . NTMS, page 1-6. IEEE, (2011)Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection, and . Cryptology and Network Security, volume 3810 of Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 10.1007/11599371_8.(2005)Automated Log Analysis of Infected Windows OS Using Mechanized Reasoning.. ICONIP (2), volume 5864 of Lecture Notes in Computer Science, page 540-547. Springer, (2009)A Dynamic Protection System of Web Server in Virtual Cluster Using Live Migration., , , and . DASC, page 95-102. IEEE Computer Society, (2009)Choice of Parallelism: Multi-GPU Driven Pipeline for Huge Academic Backbone Network., , and . CoRR, (2021)Parallel analysis of polymorphic viral code using automated deduction system.. SNPD (2), page 585-592. IEEE Computer Society, (2007)Faster Log Analysis and Integration of Security Incidents Using Knuth-Bendix Completion., and . ICONIP (2), volume 7063 of Lecture Notes in Computer Science, page 28-36. Springer, (2011)An Enhancement of Trusted Domain Enforcement using VMM Interruption Mechanism., , and . ICYCS, page 2222-2229. IEEE Computer Society, (2008)Log Analysis of Exploitation in Cloud Computing Environment Using Automated Reasoning., , and . ICONIP (2), volume 6444 of Lecture Notes in Computer Science, page 337-343. Springer, (2010)