Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing., and . TrustCom, page 170-176. IEEE Computer Society, (2012)Exploiting an antivirus interface., , , , and . Computer Standards & Interfaces, 31 (6): 1182-1189 (2009)Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors., , and . DMS, page 257-260. Knowledge Systems Institute, (2010)Centralized Security Labels in Decentralized P2P Networks., , and . ACSAC, page 315-324. IEEE Computer Society, (2007)Secure Semantic Sensor Web and Pervasive Computing., and . SUTC/UMC, page 5-10. IEEE Computer Society, (2010)CUDA au Coq: A Framework for Machine-validating GPU Assembly Programs., , and . DATE, page 474-479. IEEE, (2019)Binary Control-Flow Trimming., and . CCS, page 1009-1022. ACM, (2019)Vigiles: Fine-Grained Access Control for MapReduce Systems., , , and . BigData Congress, page 40-47. IEEE Computer Society, (2014)Data Mining for Security Applications., , , and . EUC (2), page 585-589. IEEE Computer Society, (2008)978-0-7695-3492-3.Automated Threat Report Classification over Multi-Source Data., , , , and . CIC, page 236-245. IEEE Computer Society, (2018)