Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing., , and . ICSS, page 24-31. ACM, (2017)Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypots., , , , and . NCS, volume 310 of Lecture Notes in Networks and Systems, page 151-162. Springer, (2021)Managing Security in FPGA-Based Embedded Systems., , , , , , and . IEEE Des. Test Comput., 25 (6): 590-598 (2008)A Model for Temporal Interval Authorizations., , , and . HICSS, IEEE Computer Society, (2006)Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture., , , , , , , and . TRUST, volume 5471 of Lecture Notes in Computer Science, page 133-152. Springer, (2009)Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores., , , and . ESSoS, volume 8978 of Lecture Notes in Computer Science, page 86-101. Springer, (2015)ODSS: A Ghidra-based Static Analysis Tool for Detecting Stack-Based Buffer Overflows., , and . HICSS, page 6726-6735. ScholarSpace, (2023)MYSEA: the monterey security architecture., , , , , , , and . STC, page 39-48. ACM, (2009)A security architecture for transient trust., , , and . CSAW, page 1-8. ACM, (2008)Security Primitives for Reconfigurable Hardware-Based Systems., , , , , , , and . ACM Trans. Reconfigurable Technol. Syst., 3 (2): 10:1-10:35 (2010)