Author of the publication

Marlin: Mitigating Code Reuse Attacks Using Code Randomization.

, , , and . IEEE Trans. Dependable Sec. Comput., 12 (3): 326-337 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Generalized Temporal Role-Based Access Control Model., , , and . IEEE Trans. Knowl. Data Eng., 17 (1): 4-23 (2005)Association Rule Hiding., , , , and . IEEE Trans. Knowl. Data Eng., 16 (4): 434-447 (2004)Static Analysis of Logical Languages with Deferred Update Semantics., and . IEEE Trans. Knowl. Data Eng., 15 (2): 386-404 (2003)Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases., , and . IEEE Trans. Knowl. Data Eng., 8 (5): 839-854 (1996)Advanced Transaction Processing in Multilevel Secure File Stores., , , and . IEEE Trans. Knowl. Data Eng., 10 (1): 120-135 (1998)Guest Editorial: Introduction to the Special Section., , and . IEEE Trans. Knowl. Data Eng., 12 (1): 58-59 (2000)Transactions and Updates in Deductive Databases., , and . IEEE Trans. Knowl. Data Eng., 9 (5): 784-797 (1997)Object-Oriented Query Languages: The Notion and the Issues., , , and . IEEE Trans. Knowl. Data Eng., 4 (3): 223-237 (1992)Secure kNN Query Processing in Untrusted Cloud Environments., , , and . IEEE Trans. Knowl. Data Eng., 26 (11): 2818-2831 (2014)An Extended Algebra for Constraint Databases., , and . IEEE Trans. Knowl. Data Eng., 10 (5): 686-705 (1998)