Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Editorial: Regular, Special, and Related Issues.. ACM Trans. Embed. Comput. Syst., 14 (1): 1:1-1:2 (2015)Editorial: Oh Security - Where Art Thou?. ACM Trans. Embed. Comput. Syst., 14 (2): 20:1-20:2 (2015)Online strategies for dynamic power management in systems with multiple power-saving states., , and . ACM Trans. Embed. Comput. Syst., 2 (3): 325-346 (2003)Towards a heterogeneous simulation kernel for system-level models: a SystemC kernel for synchronous data flow models., and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 24 (8): 1261-1271 (2005)Machine learning in cybersecurity: A review., , and . WIREs Data Mining Knowl. Discov., (2019)Design Issues for Networked Embedded Systems., , , and . Embedded Systems Handbook, CRC Press, (2005)Hardware optimizations for crypto implementations (Invited paper)., and . VDAT, page 1-6. IEEE, (2016)Automated Windows behavioral tracing for malware analysis., , , and . Secur. Priv., (November 2022)Malware Detection in Word Documents Using Machine Learning., , , and . ACeS, volume 1347 of Communications in Computer and Information Science, page 325-339. Springer, (2020)Ransomware Detection based on Network Behavior using Machine Learning and Hidden Markov Model with Gaussian Emission., , , and . CSR, page 227-233. IEEE, (2023)