Author of the publication

A practical approach for generic bootkit detection and prevention.

, , and . EUROSEC, page 4:1-4:6. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SWAP: Mitigating XSS attacks using a reverse proxy., , , , and . SESS@ICSE, page 33-39. IEEE Computer Society, (2009)Abusing Social Networks for Automated User Profiling., , , , , and . RAID, volume 6307 of Lecture Notes in Computer Science, page 422-441. Springer, (2010)dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection., , , and . DIMVA, volume 6201 of Lecture Notes in Computer Science, page 41-60. Springer, (2010)Bootstrapping Performance and Dependability Attributes of Web Services., , and . ICWS, page 205-212. IEEE Computer Society, (2006)MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis., , and . COMPSAC, page 422-433. IEEE Computer Society, (2015)Building an Integrated Pan-European News Distribution Network., , and . PRO-VE, volume 186 of IFIP, page 587-596. Springer, (2005)Integrating Quality of Service Aspects in Top-Down Business Process Development Using WS-CDL and WS-BPEL., , , , and . EDOC, page 15-26. IEEE Computer Society, (2007)A View to a Kill: WebView Exploitation., , and . LEET, USENIX Association, (2013)Discovery., , and . Encyclopedia of Database Systems (2nd ed.), Springer, (2018)Discovery., , and . Encyclopedia of Database Systems, Springer US, (2009)