1 | -- | 21 | Éric Lacombe, Vincent Nicomette, Yves Deswarte. Enforcing kernel constraints by hardware-assisted virtualization |
23 | -- | 49 | Anthony Desnos, Eric Filiol, Ivan Lefou. Detecting (and creating !) a HVM rootkit (aka BluePill-like) |
51 | -- | 62 | Manuel Egele, Clemens Kolbitsch, Christian Platzer. Removing web spam links from search engine results |
63 | -- | 81 | Ayesha Binte Ashfaq, Muhammad Qasim Ali, Syed Ali Khayam. Accuracy improving guidelines for network anomaly detection systems |
83 | -- | 93 | Julien Desfossez, Justine Dieppedale, Gabriel Girard. Stealth malware analysis from kernel space with Kolumbo |