1. A security framework for the analysis and design of software attestation
2. On the difficulty of software-based attestation of embedded devices
3. Ralf Hund Thorsten Holz and Felix C Freiling. 2009. Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In USENIX security symposium. 383–398. Ralf Hund Thorsten Holz and Felix C Freiling. 2009. Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In USENIX security symposium. 383–398.
4. An IoT based fire alarming and authentication system for workhouse using Raspberry Pi 3
5. Leila Ismail . 2008. A Secure Mobile Agents Platform. Journal of Communications 3 (04 2008 ). https://doi.org/10.4304/jcm.3.2.1-12 10.4304/jcm.3.2.1-12 Leila Ismail. 2008. A Secure Mobile Agents Platform. Journal of Communications 3 (04 2008). https://doi.org/10.4304/jcm.3.2.1-12