Author of the publication

Improving Virtualization Security by Splitting Hypervisor into Smaller Components.

, , , and . DBSec, volume 7371 of Lecture Notes in Computer Science, page 298-313. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Iterative Algorithm for Two Infinite Families of Multivalued Quasi-Nonexpansive Mappings in Uniformly Convex Banach Spaces., , and . J. Applied Mathematics, (2013)Micro Energy Harvester With Dual Electrets on Sandwich Structure Optimized by Air Damping Control for Wireless Sensor Network Application., , , and . IEEE Access, (2018)Quantitative survivability evaluation of three virtual machine-based server architectures., , , , , , and . J. Network and Computer Applications, 36 (2): 781-790 (2013)Fabrication of nanofiber-based SERS-active substrates by oxygen plasma removal of SU-8 photoresist., , , and . NEMS, page 993-996. IEEE, (2010)Optimized digital automatic gain control for DVB-S2 system., , , , and . WTS, page 1-5. IEEE, (2010)Research on establishing numerical model of geo material based on CT image analysis., , , , and . EURASIP J. Image and Video Processing, (2019)Towards Memory Safe Enclave Programming with Rust-SGX., , , , , , , , , and . CCS, page 2333-2350. ACM, (2019)Improving Virtualization Security by Splitting Hypervisor into Smaller Components., , , and . DBSec, volume 7371 of Lecture Notes in Computer Science, page 298-313. Springer, (2012)Towards Discovering and Understanding Task Hijacking in Android., , , , and . USENIX Security Symposium, page 945-959. USENIX Association, (2015)Forensically Sound Retrieval and Recovery of Images from GPU Memory., , , and . ICDF2C, volume 157 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 53-66. Springer, (2015)