Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HeNet: A Deep Learning Approach on Intel® Processor Trace for Effective Exploit Detection., , and . IEEE Symposium on Security and Privacy Workshops, page 109-115. IEEE Computer Society, (2018)A file provenance system., and . CODASPY, page 153-156. ACM, (2013)Link correlation and network coding in broadcast protocols for wireless sensor networks., , , and . SECON, page 59-61. IEEE, (2012)Characterizing Failures in Mobile OSes: A Case Study with Android and Symbian., , , and . ISSRE, page 249-258. IEEE Computer Society, (2010)A Lightweight Secure Provenance Scheme for Wireless Sensor Networks., , , and . ICPADS, page 101-108. IEEE Computer Society, (2012)Digital provenance - models, systems, and applications. Purdue University, USA, (2014)Effective Key Management in Dynamic Wireless Sensor Networks., , , and . IEEE Trans. Inf. Forensics Secur., 10 (2): 371-383 (2015)A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks., , , and . IEEE Trans. Dependable Secur. Comput., 12 (3): 256-269 (2015)Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces., , , and . ISC, volume 11723 of Lecture Notes in Computer Science, page 341-359. Springer, (2019)A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks., , and . ICDCS Workshops, page 332-338. IEEE Computer Society, (2011)