Cited By
View all- Liu JHao XArpaci-Dusseau AArpaci-Dusseau RChajed T(2024)Shadow Filesystems: Recovering from Filesystem Runtime Errors via Robust Alternative ExecutionProceedings of the 16th ACM Workshop on Hot Topics in Storage and File Systems10.1145/3655038.3665942(15-22)Online publication date: 8-Jul-2024
- McIntosh TWatters PKayes ANg AChen Y(2021)Enforcing situation-aware access control to build malware-resilient file systemsFuture Generation Computer Systems10.1016/j.future.2020.09.035115:C(568-582)Online publication date: 1-Feb-2021
- Prabhu J. Malar B(2020)Data Storage Security in the Cloud Environment Using the Honey Pot SystemInternational Journal of e-Collaboration10.4018/IJeC.202010010116:4(1-14)Online publication date: 1-Oct-2020
- Show More Cited By