Author of the publication

Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks.

, and . RAID, volume 3858 of Lecture Notes in Computer Science, page 146-164. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Sufatrio,
add a person with the name Sufatrio,
 

Other publications of authors with the same name

Trusted Principal-Hosted Certificate Revocation., and . IFIPTM, volume 358 of IFIP Advances in Information and Communication Technology, page 173-189. Springer, (2011)Securing Android: A Survey, Taxonomy, and Challenges., , , and . ACM Comput. Surv., 47 (4): 58:1-58:45 (2015)Internet Mobility Support Optimized for Client Access and its Scalable Authentication Framework., and . MDA, volume 1748 of Lecture Notes in Computer Science, page 220-229. Springer, (1999)A Lightweight Binary Authentication System for Windows., , , , and . IFIPTM, volume 263 of IFIP Advances in Information and Communication Technology, page 295-310. Springer, (2008)Extending BAN Logic for Reasoning with Modern PKI-Based Protocols., and . NPC Workshops, page 190-197. IEEE Computer Society, (2008)WinResMon: A Tool for Discovering Software Dependencies, Configuration, and Requirements in Microsoft Windows., , , and . LISA, page 175-186. USENIX, (2006)A Machine-Oriented Vulnerability Database for Automated Vulnerability Detection and Processing., , and . LISA, page 47-58. USENIX, (2004)Mobile IP Registration Protocol: A Security Attack and New Secure Minimal Public-Key Based Authentication., and . ISPAN, page 364-369. IEEE Computer Society, (1999)Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications., , and . ACE, page 114-122. ACM, (2022)Control flow obfuscation for Android applications., , , and . Computers & Security, (2016)