Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reducing Complex Visualizations for Analysis., and . HICSS, page 1-7. ScholarSpace / AIS Electronic Library (AISeL), (2017)Mitigating 0-Days through Heap Techniques - An Empirical Study., and . HICSS, page 5569-5577. IEEE Computer Society, (2016)Femme avec une Fleur., , , , , , and . ACM Southeast Regional Conference, page 551. ACM, (2007)Identifying Weaknesses in VM/Hypervisor Interfaces., and . HICSS, page 5089-5095. IEEE Computer Society, (2013)Capture the Flag as Cyber Security Introduction., , and . HICSS, page 5479-5486. IEEE Computer Society, (2016)Teaching Digital Forensics Techniques within Linux Environments., and . HICSS, page 4848-4856. IEEE Computer Society, (2014)Are Your Papers in Order? Developing and Enforcing Multi-tenancy and Migration Policies in the Cloud., , , and . HICSS, page 5473-5479. IEEE Computer Society, (2012)