Author of the publication

Virtual-Machine-based Intrusion Detection on File-aware Block Level Storage.

, , , and . SBAC-PAD, page 185-192. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FMTCP: A Fountain Code-Based Multipath Transmission Control Protocol., , , , and . ICDCS, page 366-375. IEEE Computer Society, (2012)Wireless link scheduling for data center networks., , and . ICUIMC, page 44. ACM, (2011)Assessment of Fringe Pattern Decomposition with a Cross-Correlation Index for Phase Retrieval in Fringe Projection 3D Measurements., , , and . Sensors, 18 (10): 3578 (2018)Investigations on immunity of interfaces between intelligent media processor and DDR3 SDRAM memory., , , , , and . Microelectronics Reliability, (2018)An adaptive Q factor tuning and input impedance matching method for ultra-low power front end of UHF RFID tag., , , , , , , , and . ASICON, page 1-4. IEEE, (2013)Distributed Systems Meet Economics: Pricing in the Cloud., , , , , and . HotCloud, USENIX Association, (2010)Improved deep packet inspection in data stream detection., , , , and . The Journal of Supercomputing, 75 (8): 4295-4308 (2019)Channel allocation in wireless data center networks., , and . INFOCOM, page 1395-1403. IEEE, (2011)Probabilistic Multi-path Routing for Multimedia Over Wireless Mesh Networks., , , , , and . Ad Hoc & Sensor Wireless Networks, 14 (3-4): 205-225 (2012)Semidefinite Programming for MIMO Radar Target Localization using Bistatic Range Measurements., , , and . EUSIPCO, page 1-5. IEEE, (2019)