Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Policy-based Security Provisioning and Performance Control in the Cloud., , , , , and . CLOSER, page 502-508. SciTePress, (2013)Service Level Agreement Complexity: Processing Concerns for Standalone and Aggregate SLAs., and . CoRR, (2014)Dynamic Analysis of Executables to Detect and Characterize Malware., , , , , , and . CoRR, (2017)Towards robust trust in software defined networks., and . GLOBECOM Workshops, page 166-171. IEEE, (2014)Neurogenesis deep learning: Extending deep networks to accommodate new classes., , , , , , , , and . IJCNN, page 526-533. IEEE, (2017)Dynamic Analysis of Executables to Detect and Characterize Malware., , , , , , and . ICMLA, page 16-22. IEEE, (2018)QoS Performance Evaluation of Disjoint Queue Scheduler for Video-Applications over LTE-A HetNets., , , , and . ICCCNT, page 4:1-4:7. ACM, (2016)Mind the Gap: On Bridging the Semantic Gap between Machine Learning and Malware Analysis., , , , , , , , , and . AISec@CCS, page 49-60. ACM, (2020)Overlay Architectures Enabling Cloud Computing for Multi-level Security Environments., and . SERVICES, page 116-124. IEEE Computer Society, (2012)Usage Management of Personal Health Records, , and . CoRR, (2012)