Author:
Sekar R.,Venkatakrishnan V.N.,Basu Samik,Bhatkar Sandeep,DuVarney Daniel C.
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Supply-Chain Vulnerability Elimination via Active Learning and Regeneration;Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security;2021-11-12
2. PAM: process authentication mechanism for protecting system services against malicious code attacks;Sādhanā;2020-06-02
3. A Novel Security Architecture Based on Multi-level Rule Expression Language;Hybrid Intelligent Systems;2015-11-17
4. JaTE;Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015;2015
5. Provenance-based Integrity Protection for Windows;Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015;2015