Author of the publication

AppGuard: A hardware virtualization based approach on protecting user applications from untrusted commodity operating system.

, , , , and . ICNC, page 685-689. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Zang, Wanyu
add a person with the name Zang, Wanyu
 

Other publications of authors with the same name

Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures., , , and . SECRYPT, page 478-485. SciTePress, (2010)Quantitative survivability evaluation of three virtual machine-based server architectures., , , , , , and . J. Network and Computer Applications, 36 (2): 781-790 (2013)A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes., and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 289-302. Springer, (2006)JAPS-II: A Source to Source Parallelizing Compiler for Java., , , , and . PDPTA, page 164-170. CSREA Press, (2002)Risk balance defense approach against intrusions for network server., , , and . Int. J. Inf. Sec., 13 (3): 255-269 (2014)Intrusion Masking for Distributed Atomic Operations., , and . SEC, volume 250 of IFIP Conference Proceedings, page 229-240. Kluwer, (2003)Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks., , , and . ICC, page 1-6. IEEE, (2011)Approximate Self-Adaptive Data Collection in Wireless Sensor Networks., , , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 564-575. Springer, (2014)Shuffler: Mitigate Cross-VM Side-Channel Attacks via Hypervisor Scheduling., , , , , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 491-511. Springer, (2018)Incentive-based modeling and inference of attacker intent, objectives, and strategies., and . ACM Conference on Computer and Communications Security, page 179-189. ACM, (2003)