A systematic survey of self-protecting software systems

E Yuan, N Esfahani, S Malek - ACM Transactions on Autonomous and …, 2014 - dl.acm.org
Self-protecting software systems are a class of autonomic systems capable of detecting and
mitigating security threats at runtime. They are growing in importance, as the stovepipe static …

Architecture-based self-protecting software systems

E Yuan, S Malek, B Schmerl, D Garlan… - Proceedings of the 9th …, 2013 - dl.acm.org
Since conventional software security approaches are often manually developed and
statically deployed, they are no longer sufficient against today's sophisticated and evolving …

Electric fields and charge separation for solid oxide fuel cell electrodes

NJ Williams, ID Seymour, D Fraggedakis… - Nano Letters, 2022 - ACS Publications
Activation losses at solid oxide fuel cell (SOFC) electrodes have been widely attributed to
charge transfer at the electrode surface. The electrostatic nature of electrode–gas …

Degradation dynamics of quantum dots in white LED applications

HC Chen, A Shabir, CM Tan, P Singh, JH Lin - Scientific Reports, 2021 - nature.com
Abstract Quantum Dots (QDs) are being investigated in a hybrid white light LED structure
which inculcates phosphor in the package with a blue LED chip as the light source recently …

Hypervisor-based protection of sensitive files in a compromised system

J Wang, M Yu, B Li, Z Qi, H Guan - Proceedings of the 27th annual ACM …, 2012 - dl.acm.org
One of the most fundamental issues in computer security is protecting sensitive files from
unauthorized access. Traditional file protection tools run inside the target operating system …

vMON: An efficient out-of-VM process monitor for virtual machines

N Li, B Li, J Li, T Wo, J Huai - 2013 IEEE 10th International …, 2013 - ieeexplore.ieee.org
Cloud computing service has been evolved in providing a whole virtual data center from
selling scattered virtual machines (VMs). Process Monitoring of a VM is a fundamental …

Ctrust: A framework for secure and trustworthy application execution in cloud computing

S Nimgaonkar, S Kotikela… - … Conference on Cyber …, 2012 - ieeexplore.ieee.org
Cloud computing is a model that envisions ubiquitous access to a shared pool of
configurable resources such as compute, storage, network, and software. Currently …

Security and software engineering

S Malek, H Bagheri, J Garcia, A Sadeghi - Handbook of Software …, 2019 - Springer
Software systems are permeating every facet of our society, making security breaches
costlier than ever before. At the same time, as software systems grow in complexity, so does …

[PDF][PDF] Building Trust in Modern Computing Platforms

A Dhar - 2021 - research-collection.ethz.ch
User interfaces (UI) are essential parts of modern complex computing platforms as it dictates
how humans provide inputs to these systems and interpret output from them. Many remote …

Intelligent distributed multimedia secure system towards trusted cloud computing paradigm

A Sreeramaneni, KOH Chan - 한국정보기술학회논문지, 2016 - dbpia.co.kr
Smart devices exploit cloud computing to lessen the resource constrains and provide real-
time services to users with cost effective features. Today's miscellany of end user electronic …