Cited By
View all- Kim SJin HJoo KLee JLee D(2024)DROPSYS: Detection of ROP attacks using system informationComputers & Security10.1016/j.cose.2024.103813(103813)Online publication date: Mar-2024
- Guri M(2023)AirKeyLogger: Hardwareless Air-Gap Keylogging Attack2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)10.1109/COMPSAC57700.2023.00089(637-647)Online publication date: Jun-2023
- Gonçalves CMenasché DAvritzer AAntunes NVieira M(2023)Detecting Anomalies Through Sequential Performance Analysis in Virtualized EnvironmentsIEEE Access10.1109/ACCESS.2023.329364311(70716-70740)Online publication date: 2023
- Show More Cited By