Mail:
Phone:
Mobile phone:
Web page:
SNAPPY: programmable kernel-level policies for containers (ACM SAC, 2021)
Leveraging Kernel Security Mechanisms to Improve Container Security: a Survey (ARES, 2019)
K-binID: Kernel binary code identification for Virtual Machine Introspection (DSC, 2017)
Hidden process detection using kernel functions instrumentation (DSC, 2017)
Virtual Machine Introspection: Techniques and Applications (ARES, 2015)
AMAD: Resource Consumption Profile-Aware Attack Detection in IaaS Cloud (UCC, 2014)
When Dynamic VM Migration Falls under the Control of VM Users (CloudCom, 2013)
Engineering Intrusion Prevention Services for IaaS Clouds: The Way of the Hypervisor (SOSE, 2013)
Reconsidering Intrusion Monitoring Requirements in Shared Cloud Platforms (ARES, 2013)
A cross-layer reputation system for routing non-cooperation effects mitigation within hybrid ad-hoc networks (IWCMC, 2010)
The Topology Change Attack: Threat and Impact ( JUCS, 2009)
Cooperation monitoring issues in ad hoc networks (IWCMC, 2006)