Author of the publication

Analysis and Exercises for Engaging Beginners in Online CTF Competitions for Security Education.

, , , , and . ASE @ USENIX Security Symposium, USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defending against packet injection attacks unreliable ad hoc networks., , , and . GLOBECOM, page 5. IEEE, (2005)KTR: an Efficient Key Management Scheme For Air Access Control., , , and . MobiQuitous, page 499-501. IEEE Computer Society, (2005)Originator Data Security for Collaborative Task Execution among Weak Devices., and . MASS, page 421-422. IEEE Computer Society, (2013)Reserving Processors by Precise Scheduling of Mixed-Criticality Tasks., , , and . RTCSA, page 103-108. IEEE, (2021)A Multi-Point Distance-Bounding Protocol for Securing Automatic Dependent Surveillance-Broadcast in Unmanned Aerial Vehicle Applications., and . J. Comput. Sci. Technol., 35 (4): 825-842 (2020)Efficient code diversification for network reprogramming in sensor networks.. WISEC, page 145-150. ACM, (2010)Securing ADS-B with Multi-Point Distance-Bounding for UAV Collision Avoidance., and . MASS, page 145-153. IEEE, (2019)A heuristic ant algorithm for solving QoS multicast routing problem., , , and . IEEE Congress on Evolutionary Computation, page 1630-1635. IEEE, (2002)Marcher: A Heterogeneous System Supporting Energy-Aware High Performance Computing and Big Data Analytics., , and . Big Data Res., (2017)Transient clouds: Assignment and collaborative execution of tasks on mobile devices., , , , and . GLOBECOM, page 2801-2806. IEEE, (2014)