Cited By
View all- SHOJI ASHINJO Y(2023)Implementation method of non-bypassable PC application firewalls using virtualization technologies2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)10.1109/HPCC-DSS-SmartCity-DependSys60770.2023.00066(435-442)Online publication date: 17-Dec-2023
- Daubner LBuhnova BPitner T(2023)Forensic experts' view of forensic‐ready software systems: A qualitative studyJournal of Software: Evolution and Process10.1002/smr.2598Online publication date: 12-Jul-2023
- Fassl MAnell SHouy SLindorfer MKrombholz KChiasson SKapadia A(2022)Comparing user perceptions of anti-stalkerware apps with the technical realityProceedings of the Eighteenth USENIX Conference on Usable Privacy and Security10.5555/3563609.3563617(135-154)Online publication date: 8-Aug-2022
- Show More Cited By