Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Information Leakage Detection: A New Method Combining Machine Learning and Hypothesis Testing with an Application to Side-channel Detection in Cryptographic Protocols., , , , , and . ICAART (2), page 152-163. SCITEPRESS, (2022)Component-based timed hazard analysis of self-healing systems., , and . ASAS@ESEC/FSE, page 34-43. ACM, (2011)Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!, , , , , , , and . AISec@CCS, page 169-180. ACM, (2021)Towards a Method for End-to-End SDN App Development., , and . EWSDN, page 107-108. IEEE Computer Society, (2015)Anwendung von maschinellem Lernen zum automatischen Erkennen von Padding-Orakel-Seitenkanälen., , , and . Softwaretechnik-Trends, 43 (3): 15-17 (August 2023)Modeling and verifying dynamic communication structures based on graph transformations., , , , , and . Comput. Sci. Res. Dev., 28 (1): 3-22 (2013)Modeling and Verifying Dynamic Communication Structures based on Graph Transformations., , , and . Software Engineering, volume P-159 of LNI, page 153-164. GI, (2010)Component-Based Hazard Analysis for Mechatronic Systems., , , and . ISORC Workshops, page 80-87. IEEE Computer Society, (2011)