Author of the publication

A generalized model for preventing information leakage in hard real-time systems.

, , , , , and . RTAS, page 271-282. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-Time Systems Security through Scheduler Constraints., , , and . ECRTS, page 129-140. IEEE Computer Society, (2014)Toward Metrics for Differentiating Out-of-Distribution Sets., , , , and . CoRR, (2019)A generalized model for preventing information leakage in hard real-time systems., , , , , and . RTAS, page 271-282. IEEE Computer Society, (2015)An empirical study on the software integrity of virtual appliances: are you really getting what you paid for?, , , , , , and . AsiaCCS, page 231-242. ACM, (2013)Evidence of log integrity in policy-based security monitoring., , , , and . DSN Workshops, page 1-6. IEEE Computer Society, (2012)Power flow cyber attacks and perturbation-based defense., , , and . SmartGridComm, page 342-347. IEEE, (2012)Third International Workshop on Dependable and Secure Machine Learning - DSML 2020., , , , , , and . DSN Workshops, page x. IEEE, (2020)Assessing software integrity of virtual appliances through software whitelists., , , , , , and . NDSS, The Internet Society, (2013)Limiting Data Exposure in Monitoring Multi-domain Policy Conformance., , , and . TRUST, volume 7904 of Lecture Notes in Computer Science, page 65-82. Springer, (2013)A framework integrating attribute-based policies into role-based access control., , , and . SACMAT, page 187-196. ACM, (2012)