Author of the publication

Isolation of Malicious External Inputs in a Security Focused Adaptive Execution Environment.

, , , , , , and . ARES, page 82-91. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Habito News: A research tool to investigate mobile news reading., , , and . MobileHCI Adjunct, page 598. ACM, (2015)Fusion of Moderate Resolution Earth Observations for Operational Crop Type Mapping., , , , , and . Remote Sensing, 10 (7): 1058 (2018)Detecting Hand Posture in Piano Playing Using Depth Data., , and . Computer Music Journal, 43 (1): 59-78 (2019)Teaching Agile Methods to Software Engineering Professionals: 10 Years, 1000 Release Plans., , and . XP, volume 283 of Lecture Notes in Business Information Processing, page 151-166. (2017)"Why Did You Do That?" - Explaining Black Box Models with Inductive Synthesis., , , and . ICCS (5), volume 11540 of Lecture Notes in Computer Science, page 334-345. Springer, (2019)Evaluation of a single radio rural mesh network in South Africa.. ICTD, page 1-9. IEEE, (2007)A Wingman for Virtual Appliances., , , and . RV, volume 10548 of Lecture Notes in Computer Science, page 390-399. Springer, (2017)Robot couriers: precise mobility in a wireless network testbed., , , , , , , , and . SenSys, page 276-277. ACM, (2005)Towards a High Quality Path-Oriented Network Measurement and Storage System., , and . PAM, volume 4979 of Lecture Notes in Computer Science, page 102-111. Springer, (2008)Powder: Platform for Open Wireless Data-driven Experimental Research., , , , , , , , , and 13 other author(s). Comput. Networks, (2021)