Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Control of Wind Farm Power Set Points to Minimise Fatigue Loads., , , and . ACC, page 4843-4848. IEEE, (2020)A Security Analysis of Labeling-Based Control-Flow Integrity Schemes., , , and . HiPCW, page 47-52. IEEE, (2022)Control Flow and Pointer Integrity Enforcement in a Secure Tagged Architecture., , , , , , , , , and . SP, page 2974-2989. IEEE, (2023)Generic Tagging for RISC-V Binaries., , , , , , and . CoRR, (2022)Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage., and . NordSec, volume 13700 of Lecture Notes in Computer Science, page 215-233. Springer, (2022)Measuring Marine Plastic Debris from Space: Initial Assessment of Observation Requirements., , , , , , , , , and 22 other author(s). Remote. Sens., 11 (20): 2443 (2019)Politics by Automatic Means? A Critique of Artificial Intelligence Ethics at Work., , , and . Frontiers Artif. Intell., (2022)Simplex: Repurposing Intel Memory Protection Extensions for Information Hiding., and . CoRR, (2020)Supplementing Modern Software Defenses with Stack-Pointer Sanity., , and . ACSAC, page 116-127. ACM, (2017)Data-driven mobility risk prediction for planetary rovers., , , , and . J. Field Robotics, 36 (2): 475-491 (2019)