Assessing trust in uncertain information using Bayesian Description LogicsAchille FokoueMudhakar Srivatsaet al.2010CCS 2010
AccessMiner: Using system-centric models for malware protectionAndrea LanziDavide Balzarottiet al.2010CCS 2010
Scalable integrity monitoring in virtualized environmentsKenneth GoldmanReiner Saileret al.2010CCS 2010
Security audits of multi-tier virtual infrastructures in public infrastructure cloudsSören BleikertzMatthias Schunteret al.2010CCS 2010