Author of the publication

A Cross-Virtual Machine Network Channel Attack via Mirroring and TAP Impersonation.

, , , , , and . IEEE CLOUD, page 606-613. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust beyond computation alone: human aspects of trust in blockchain technologies., and . ICSE-SEIS, page 21-30. ACM, (2019)Design Considerations for Building Credible Security Testbeds: A Systematic Study of Industrial Control System Use Cases., , , , and . CoRR, (2019)Everything Is Awesome! or Is It? Cyber Security Risks in Critical Infrastructure., , , and . CRITIS, volume 11777 of Lecture Notes in Computer Science, page 3-17. Springer, (2019)Developing for non-human users: Reflecting on practical implications in the ubiquitous computing era., , , and . J. Ind. Inf. Integr., (2019)Information bias and trust in bitcoin speculation.. Lancaster University, UK, (2017)British Library, EThOS.A Cross-Virtual Machine Network Channel Attack via Mirroring and TAP Impersonation., , , , , and . IEEE CLOUD, page 606-613. IEEE Computer Society, (2018)Is cybersecurity research missing a trick? Integrating insights from the psychology of habit into research and practice., , and . Comput. Secur., (May 2023)A just culture is fundamental: extending security ergonomics by design.. SEsCPS@ICSE, page 46-49. IEEE / ACM, (2019)Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds., , , and . CPS-SPC@CCS, page 75-86. ACM, (2019)Smart Cyber-Physical Systems: Beyond Usable Security to Security Ergonomics by Design., and . SEsCPS@ICSE, page 22-25. IEEE, (2017)