Mail:
Phone:
Mobile phone:
Web page:
Towards Provenance for Cybersecurity in Cloud-Native Production Infrastructure (DSN-S, 2025)
SNAPPY: programmable kernel-level policies for containers (SAC, 2021)
Leveraging Kernel Security Mechanisms to Improve Container Security: a Survey (ARES, 2019)
Hidden process detection using kernel functions instrumentation (DSC, 2017)
K-binID: Kernel binary code identification for Virtual Machine Introspection (DSC, 2017)
Virtual Machine Introspection: Techniques and Applications (ARES, 2015)
AMAD: Resource Consumption Profile-Aware Attack Detection in IaaS Cloud (UCC, 2014)
When Dynamic VM Migration Falls under the Control of VM Users (CloudCom, 2013)
Reconsidering Intrusion Monitoring Requirements in Shared Cloud Platforms (ARES, 2013)
Engineering Intrusion Prevention Services for IaaS Clouds: The Way of the Hypervisor (SOSE, 2013)
A cross-layer reputation system for routing non-cooperation effects mitigation within hybrid ad-hoc networks (IWCMC, 2010)
The Topology Change Attack: Threat and Impact (JUCS, 2009)
Cooperation monitoring issues in ad hoc networks (IWCMC, 2006)