Cited By
View all- Skalka CAmir-Mohammadian SClark S(2020)Maybe tainted data: Theory and a case studyJournal of Computer Security10.3233/JCS-191342(1-41)Online publication date: 1-Apr-2020
- Wu ZChen XYang ZDu X(2019)Reducing Security Risks of Suspicious Data and Codes Through a Novel Dynamic Defense ModelIEEE Transactions on Information Forensics and Security10.1109/TIFS.2019.290179814:9(2427-2440)Online publication date: Sep-2019
- Zhang QWu YCui C(2018)A New Method of Live Tracking of Process MemoryProceedings of the 2nd International Conference on Cryptography, Security and Privacy10.1145/3199478.3199497(154-158)Online publication date: 16-Mar-2018
- Show More Cited By