Yves Younan
According to our database1,
Yves Younan
authored at least 22 papers
between 2005 and 2015.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2015
FreeSentry: protecting against use-after-free vulnerabilities due to dangling pointers.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
2013
ACM Trans. Inf. Syst. Secur., 2013
2012
ACM Comput. Surv., 2012
2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the Handbook of Information and Communication Security, 2010
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
Proceedings of the Information Systems Security - 6th International Conference, 2010
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010
Proceedings of the Detection of Intrusions and Malware, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems, 2009
Proceedings of the Second European Workshop on System Security, 2009
Proceedings of the The Forth International Conference on Availability, 2009
Proceedings of the Middleware for Network Eccentric and Mobile Applications, 2009
2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005