![]() |
| 2002 | ||
|---|---|---|
| 3 | EE | Matthew Schmid, Frank Hill, Anup K. Ghosh: Protecting Data from Malicious Software. ACSAC 2002: 199-208 |
| 2 | EE | Michael Weber, Matthew Schmid, Michael Schatz, David Geyer: A Toolkit for Detecting and Analyzing Malicious Software. ACSAC 2002: 423 |
| 1999 | ||
| 1 | EE | Anup K. Ghosh, Matthew Schmid, Frank Hill: Wrapping Windows NT Software for Robustness. FTCS 1999: 344-347 |
| 1 | David Geyer | [2] |
| 2 | Anup K. Ghosh | [1] [3] |
| 3 | Frank Hill | [1] [3] |
| 4 | Michael Schatz | [2] |
| 5 | Michael Weber | [2] |