Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring Cookies and Web Privacy in a Post-GDPR World., , , , and . PAM, volume 11419 of Lecture Notes in Computer Science, page 258-270. Springer, (2019)Botnets causing blackouts: how coordinated load attacks can destabilize the power grid., , and . Elektrotech. Informationstechnik, 135 (3): 250-255 (2018)From Hack to Elaborate Technique - A Survey on Binary Rewriting., , , and . ACM Comput. Surv., 52 (3): 49:1-49:37 (2019)Protection through isolation: Virtues and pitfalls., and . The Cloud Security Ecosystem, Elsevier, (2015)Not that Simple: Email Delivery in the 21st Century., , , and . USENIX Annual Technical Conference, page 295-308. USENIX Association, (2022)Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids., , , , and . RAID, volume 11050 of Lecture Notes in Computer Science, page 184-203. Springer, (2018)An extended view on measuring tor AS-level adversaries., , , , , , and . Comput. Secur., (September 2023)An Extended View on Measuring Tor AS-level Adversaries., , , , , , and . CoRR, (2024)The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor., and . ESORICS (2), volume 9879 of Lecture Notes in Computer Science, page 493-511. Springer, (2016)The Role and Security of Firewalls in IaaS Cloud Computing., , , and . ARES, page 70-79. IEEE Computer Society, (2015)