Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building Trust in Container Environment., , , , , and . TrustCom/BigDataSE, page 1-9. IEEE, (2019)HeteroUI: A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks., , , , and . ICICS, volume 11999 of Lecture Notes in Computer Science, page 165-180. Springer, (2019)FCEP: A Fast Concolic Execution for Reaching Software Patches., , , and . SEKE, page 510-515. KSI Research Inc., (2021)Enhancing Flexibility of TCG's TNC through Layered Property Attestation., and . TrustCom, page 751-756. IEEE Computer Society, (2011)LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining., , , , , and . MILCOM, page 292-297. IEEE, (2022)MemInspect: Memory Forensics for investigating Fileless Attacks., , , , , , and . TrustCom, page 946-955. IEEE, (2023)MMNR: A Network Representation Framework Based on Multi-View Motif Fusion., , , and . ISPA/BDCloud/SocialCom/SustainCom, page 792-801. IEEE, (2019)TBDRM: A TPM-Based Secure DRM Architecture., , and . CSE (2), page 671-677. IEEE Computer Society, (2009)TDCT: Target-Driven Concolic Testing Using Extended Units by Calculating Function Relevance., , , and . ICA3PP (3), volume 13157 of Lecture Notes in Computer Science, page 196-213. Springer, (2021)A DRTM-Based Method for Trusted Network Connection., , , and . TrustCom, page 425-435. IEEE Computer Society, (2011)