Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enforcing and validating user-defined programming disciplines., , , and . PASTE, page 85-86. ACM, (2007)Harbormaster: Policy Enforcement for Containers., , and . CloudCom, page 355-362. IEEE Computer Society, (2015)Fine-Grained Access Control with Object-Sensitive Roles., , , and . ECOOP, volume 5653 of Lecture Notes in Computer Science, page 173-194. Springer, (2009)A generic type-and-effect system., and . TLDI, page 39-50. ACM, (2009)JavaCOP: Declarative pluggable types for java., , , , , and . ACM Trans. Program. Lang. Syst., 32 (2): 4:1-4:37 (2010)Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild., , , and . RAID, volume 8688 of Lecture Notes in Computer Science, page 426-446. Springer, (2014)End-to-End Sequential Consistency, , , , and . IEEE Micro, 99 (1): 1 (5555)Tactical Provenance Analysis for Endpoint Detection and Response Systems., , and . SP, page 1172-1189. IEEE, (2020)An Artificial Intelligence Approach for Real-Time Tuning of Weighting Factors in FCS-MPC for Power Converters., , , , , , and . IEEE Trans. Ind. Electron., 69 (12): 11987-11998 (2022)Anomaly Detection in Critical-Infrastructures using Autoencoders: A Survey., , , , and . IECON, page 1-7. IEEE, (2022)