Per Larsen
Orcid: 0009-0000-2928-4121
According to our database1,
Per Larsen
authored at least 65 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Situational Awareness Data Extraction from Cooperative Virtual Reality Maritime Training Simulations.
Proceedings of 22nd European Conference on Computer-Supported Cooperative Work, 2024
2022
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022
2021
Proceedings of the EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, 2021
2020
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020
Proceedings of the 7th ACM Workshop on Moving Target Defense, 2020
2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018
2017
IEEE Trans. Dependable Secur. Comput., 2017
ACM Comput. Surv., 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the Twelfth European Conference on Computer Systems, 2017
2016
ACM Trans. Program. Lang. Syst., 2016
Proc. Priv. Enhancing Technol., 2016
Proceedings of the 2016 USENIX Annual Technical Conference, 2016
Proceedings of the 2016 USENIX Annual Technical Conference, 2016
Proceedings of the IEEE Cybersecurity Development, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 53rd Annual Design Automation Conference, 2016
Preventing kernel code-reuse attacks through disclosure resistant code diversification.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02346-0, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Principles and Practices of Programming on The Java Platform, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 2015 ACM SIGPLAN International Symposium on Memory Management, 2015
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future?
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Pattern Recognit. Lett., 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the 2014 International Conference on Principles and Practices of Programming on the Java Platform Virtual Machines, 2014
Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, 2014
Proceedings of the First ACM Workshop on Moving Target Defense, 2014
2013
Proceedings of the Moving Target Defense II, 2013
ACM Trans. Archit. Code Optim., 2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Proceedings of the 2013 International Conference on Principles and Practices of Programming on the Java Platform: Virtual Machines, 2013
Proceedings of the Information Security, 16th International Conference, 2013
Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012
Proceedings of the 41st International Conference on Parallel Processing, 2012
Proceedings of the 11th International Conference on Aspect-oriented Software Development, 2012
2011
IEEE Trans. Ind. Informatics, 2011
Automated quantification and analysis of facial asymmetry in children with arthritis in the temporomandibular joint.
Proceedings of the 8th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2011
2010
J. Telecommun. High Technol. Law, 2010
Proceedings of the 2010 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2010
2009
Proceedings of the Evolving OpenMP in an Age of Extreme Parallelism, 2009
2007
Sparse Statistical Deformation Model for the Analysis of Craniofacial Malformations in the Crouzon Mouse.
Proceedings of the Image Analysis, 15th Scandinavian Conference, 2007
Proceedings of the Image Analysis, 15th Scandinavian Conference, 2007
Proceedings of the Medical Imaging 2007: Image Processing, 2007
A Point-Wise Quantification of Asymmetry Using Deformation Fields: Application to the Study of the Crouzon Mouse Model.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention - MICCAI 2007, 10th International Conference, Brisbane, Australia, October 29, 2007
Estimation of Independent Non-Linear Deformation Modes for Analysis of Craniofacial Malformations in Crouzon Mice.
Proceedings of the 2007 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2007