From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

REORDER: Securing Dynamic-Priority Real-Time Systems Using Schedule Obfuscation., , , , и . CoRR, (2018)A Linux in unikernel clothing., , , и . EuroSys, стр. 11:1-11:15. ACM, (2020)Preserving Physical Safety Under Cyber Attacks., , , , , и . IEEE Internet Things J., 6 (4): 6285-6300 (2019)Worst-case execution time analysis of security policies for deeply embedded real-time systems.. SIGBED Rev., 5 (1): 8 (2008)TOPr: Enhanced Static Code Pruning for Fast and Precise Directed Fuzzing., , , и . CoRR, (2023)Pareto-Secure Machine Learning (PSML): Fingerprinting and Securing Inference Serving Systems., , , , , , , , и . CoRR, (2023)You Can't Always Check What You Wanted: : Selective Checking and Trusted Execution to Prevent False Actuations in Real-Time Internet-of-Things., и . ISORC, стр. 42-53. IEEE, (2023)Verified programs can party: optimizing kernel extensions via post-verification merging., , , , , и . EuroSys, стр. 283-299. ACM, (2022)A generalized model for preventing information leakage in hard real-time systems., , , , , и . RTAS, стр. 271-282. IEEE Computer Society, (2015)Temporal Analysis for Adapting Concurrent Applications to Embedded Systems., и . ECRTS, стр. 71-82. IEEE Computer Society, (2008)