Author of the publication

Poster: Towards Automated Quantitative Analysis and Forecasting of Vulnerability Discoveries in Debian GNU/Linux.

, , , and . ACM Conference on Computer and Communications Security, page 2677-2679. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NotiBike: Assessing Target Selection Techniques for Cyclist Notifications in Augmented Reality., , , , , , and . Proc. ACM Hum. Comput. Interact., 6 (MHCI): 1-24 (2022)Exploring User Expectations of Proactive AI Systems., , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 4 (4): 146:1-146:22 (2020)MOERA: Mobility-Agnostic Online Resource Allocation for Edge Computing., , , , and . IEEE Trans. Mob. Comput., 18 (8): 1843-1856 (2019)Manifestation of virtual assistants and robots into daily life: vision and challenges., , , , , , and . CCF Trans. Pervasive Comput. Interact., 1 (3): 163-174 (2019)Efficient privacy-preserving recommendations based on social graphs., , , and . RecSys, page 78-86. ACM, (2019)DeepAlign: Alignment-based Process Anomaly Correction using Recurrent Neural Networks., , , and . CoRR, (2019)Einfluß der Ladungsverteilung auf die Bindungslängen im P4O6-Gerüst von Verbindungen des Typs P4O6X, , , , , and . Angewandte Chemie, 106 (5): 578--581 (March 1994)On generating network traffic datasets with synthetic attacks for intrusion detection., , , , and . CoRR, (2019)Relative Stability of the Planar and Butterfly-like Structures of Cyclic P2O2, , , , and . The Journal of Physical Chemistry, 100 (1): 120--122 (January 1996)"Nah, it's just annoying!" A Deep Dive into User Perceptions of Two-Factor Authentication., , , , , , , and . ACM Trans. Comput. Hum. Interact., 29 (5): 43:1-43:32 (2022)