Author of the publication

How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective.

, , , , , and . ARES, page 78:1-78:10. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Overview of IDS Using Anomaly Detection., and . Database Technologies: Concepts, Methodologies, Tools, and Applications, IGI Global, (2009)Unknown malcode detection via text categorization and the imbalance problem., , , , and . ISI, page 156-161. IEEE, (2008)Unknown malcode detection - A chronological evaluation., , and . ISI, page 267-268. IEEE, (2008)Resilience of Anti-malware Programs to Naïve Modifications of Malicious Binaries., , , and . JISIC, page 152-159. IEEE, (2014)Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup., , , and . CoRR, (2019)Rendezvous Tunnel for Anonymous Publishing: Clean Slate and Tor Based Designs., , , , and . SSS, volume 6976 of Lecture Notes in Computer Science, page 223-237. Springer, (2011)9-1-1 DDoS: Attacks, Analysis and Mitigation., , and . EuroS&P, page 218-232. IEEE, (2017)BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness., , and . CoRR, (2020)PIT: A Probe Into Internet of Things by Comprehensive Security Analysis., , , and . TrustCom/BigDataSE, page 522-529. IEEE, (2019)Speaker-to-speaker covert ultrasonic communication., , and . J. Inf. Secur. Appl., (2020)