Author of the publication

Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON.

, and . FGIT-SecTech/DRBC, volume 122 of Communications in Computer and Information Science, page 57-67. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android., , , and . J. Internet Serv. Inf. Secur., 4 (2): 55-69 (2014)Mitigation of Kernel Memory Corruption Using Multiple Kernel Memory Mechanism., and . IEEE Access, (2021)Method of Generating a Blacklist for Mobile Devices by Searching Malicious Websites., , and . CANDAR (Workshops), page 328-333. IEEE, (2020)Memory Access Monitoring and Disguising of Process Information to Avoid Attacks to Essential Services., , and . CANDAR, page 635-641. IEEE Computer Society, (2016)KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism., and . ISPEC, volume 11879 of Lecture Notes in Computer Science, page 75-94. Springer, (2019)VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss., and . ARES, volume 6908 of Lecture Notes in Computer Science, page 176-190. Springer, (2011)Mitigation of privilege escalation attack using kernel data relocation mechanism., and . Int. J. Inf. Sec., 23 (5): 3351-3367 (October 2024)Physical Memory Management with Two Page Sizes in Tender OS., , and . NBiS, volume 313 of Lecture Notes in Networks and Systems, page 238-248. Springer, (2021)Flexible Method for Supporting OAuth 2.0 Based Security Profiles in Keycloak., , and . Open Identity Summit, volume P-325 of LNI, page 87-98. Gesellschaft für Informatik e.V., (2022)Design and Implementation of System for URL Signature Construction and Impact Assessment., , , , and . IIAI-AAI, page 95-100. IEEE, (2022)