Author of the publication

A Statistical Test for Information Leaks Using Continuous Mutual Information.

, and . CSF, page 177-190. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HumIDIFy: A Tool for Hidden Functionality Detection in Firmware., , and . DIMVA, volume 10327 of Lecture Notes in Computer Science, page 279-300. Springer, (2017)The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent., , , and . SecureComm, volume 106 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 185-202. Springer, (2012)Analysis of Mobility Algorithms for Forensic Virtual Machine Based Malware Detection., , and . TrustCom/BigDataSE/ISPA (1), page 766-773. IEEE, (2015)Schedulability of asynchronous real-time concurrent objects., , , and . J. Log. Algebraic Methods Program., 78 (5): 402-416 (2009)Breaking All the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices., , and . CARDIS, volume 11389 of Lecture Notes in Computer Science, page 171-185. Springer, (2018)Metrics for Action-labelled Quantitative Transition Systems., , , and . QAPL, volume 153 of Electronic Notes in Theoretical Computer Science, page 79-96. Elsevier, (2005)Capability-Passing Processes., and . FOCLASA, volume 154 of Electronic Notes in Theoretical Computer Science, page 3-23. Elsevier, (2005)A Distributed Pi-Calculus with Local Areas of Communication., and . HLCL, volume 41 of Electronic Notes in Theoretical Computer Science, page 1-16. Elsevier, (2000)Probabilistic Point-to-Point Information Leakage., , , and . CSF, page 193-205. IEEE Computer Society, (2013)Encoding Distributed Areas and Local Communication into the pi-Calculus., and . EXPRESS, volume 52 of Electronic Notes in Theoretical Computer Science, page 101-119. Elsevier, (2001)