From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Gate-Level Information-Flow Tracking for Secure Architectures., , , , , , и . IEEE Micro, 30 (1): 92-100 (2010)ACHyb: a hybrid analysis approach to detect kernel access control vulnerabilities., , , , , и . ESEC/SIGSOFT FSE, стр. 316-327. ACM, (2021)Design and Implementation of Block Chain with Cybersecurity Scheme for Fog Based Internet of Things., , , , , и . IC3I, стр. 1409-1415. IEEE, (2023)Application of Soft Computing Techniques for Predictive Analytics in Financial Markets., , , , , и . IC3I, стр. 1756-1760. IEEE, (2023)Caisson: a hardware description language for secure information flow., , , , , , и . PLDI, стр. 109-120. ACM, (2011)Sapper: a language for hardware-level security policy enforcement., , , , , , , , и . ASPLOS, стр. 97-112. ACM, (2014)Function flattening for lease-based, information-leak-free systems., , , и . ASAP, стр. 349-352. IEEE Computer Society, (2010)A Framework of Artificial Intelligence for the Manufacturing and Image Classification system., , , , , и . IC3I, стр. 1504-1508. IEEE, (2022)Using Power-Anomalies to Counter Evasive Micro-Architectural Attacks in Embedded Systems., , , , и . HOST, стр. 111-120. IEEE, (2019)Hardware assistance for trustworthy systems through 3-D integration., , , , , , и . ACSAC, стр. 199-210. ACM, (2010)