Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intercept: Profiling Windows Network Device Drivers., and . EWDC, volume 7869 of Lecture Notes in Computer Science, page 61-75. Springer, (2013)When 3f+1 Is Not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus., , , , and . DISC, volume 4731 of Lecture Notes in Computer Science, page 480-481. Springer, (2007)Tolerating Intrusions in Grid Systems., , and . Security and Management, page 207-220. CSREA Press, (2004)Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available., , , and . SRDS, page 71-82. IEEE Computer Society, (2006)Resilient State Machine Replication., , and . PRDC, page 305-309. IEEE Computer Society, (2005)Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities., and . HASE, page 379-380. IEEE Computer Society, (2007)Secure Identification of Actively Executed Code on a Generic Trusted Component., , and . DSN, page 419-430. IEEE Computer Society, (2016)Proactive resilience through architectural hybridization., , and . SAC, page 686-690. ACM, (2006)Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned., , , , and . HICSS, page 1-8. IEEE Computer Society, (2009)Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure Model., , , and . SRDS, page 2-11. IEEE Computer Society, (2002)