2002 | ||
---|---|---|
3 | EE | Matthew Schmid, Frank Hill, Anup K. Ghosh: Protecting Data from Malicious Software. ACSAC 2002: 199-208 |
2 | EE | Michael Weber, Matthew Schmid, Michael Schatz, David Geyer: A Toolkit for Detecting and Analyzing Malicious Software. ACSAC 2002: 423 |
1999 | ||
1 | EE | Anup K. Ghosh, Matthew Schmid, Frank Hill: Wrapping Windows NT Software for Robustness. FTCS 1999: 344-347 |
1 | David Geyer | [2] |
2 | Anup K. Ghosh | [1] [3] |
3 | Frank Hill | [1] [3] |
4 | Michael Schatz | [2] |
5 | Michael Weber | [2] |