Author of the publication

Translating Security Policy to Executable Code for Sandboxing Linux Kernel.

, , , and . EMS, page 124-129. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing Organizational Structures Using Social Network Analysis., , , , and . CIAO! / EOMAS, volume 34 of Lecture Notes in Business Information Processing, page 143-156. Springer, (2009)An approach for comparison of IEC 61131-3 graphical programs., , , , , and . ETFA, page 1-8. IEEE, (2013)Understanding Scalability Issues for a Distributed Simulation Environment Using Intelligent Coordinated Entities., , , , and . Software Engineering Research and Practice, page 758-763. CSREA Press, (2005)Translating Security Policy to Executable Code for Sandboxing Linux Kernel., , , and . EMS, page 124-129. IEEE Computer Society, (2009)Conflict detection during plan integration for multi-agent systems., , and . IEEE Trans. Systems, Man, and Cybernetics, Part B, 31 (4): 616-628 (2001)Experiences applying automated architecture analysis tool suites., , , , , and . ASE, page 779-789. ACM, (2018)A proposed sizing model for managing 3rd party code technical debt., and . TechDebt@ICSE, page 72-75. ACM, (2018)Supporting Location Information Privacy in Mobile Devices., , and . ICDCIT, volume 7753 of Lecture Notes in Computer Science, page 361-372. Springer, (2013)Development of Generalized HPC Simulator., , , and . ICDCIT, volume 5966 of Lecture Notes in Computer Science, page 176-179. Springer, (2010)Ontology for disaster mitigation and planning., , , , and . SCSC, page 26. Simulation Councils, Inc., (2007)