Cited By
View all- Verdier ALaborde RKandi MBenzekri A(2024)A SLAHP in the Face of DLL Search Order HijackingUbiquitous Security10.1007/978-981-97-1274-8_12(177-190)Online publication date: 13-Mar-2024
- Deepak Upadhyay MAlam M(2023)Edge Computing: Architecture, Application, Opportunities, and Challenges2023 3rd International Conference on Technological Advancements in Computational Sciences (ICTACS)10.1109/ICTACS59847.2023.10390171(695-702)Online publication date: 1-Nov-2023
- Turaev HZavarsky PSwar B(2018)Prevention of Ransomware Execution in Enterprise Environment on Windows OS: Assessment of Application Whitelisting Solutions2018 1st International Conference on Data Intelligence and Security (ICDIS)10.1109/ICDIS.2018.00024(110-118)Online publication date: Apr-2018
- Show More Cited By