Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using high-level synthesis and formal analysis to predict and preempt attacks on industrial control systems., , , and . FPGA, page 209-212. ACM, (2014)Formal Modeling of Process Migration., , and . FPL, page 104-110. IEEE, (2007)High-Level Abstractions and Modular Debugging for FPGA Design Validation., , and . ACM Trans. Reconfigurable Technol. Syst., 7 (1): 2:1-2:22 (2014)Hardware/Software Process Migration and RTL Simulation., and . FPL, page 585-588. IEEE, (2007)PATIS: Using partial configuration to improve static FPGA design productivity., , , , , and . IPDPS Workshops, page 1-8. IEEE, (2010)Thwarting Software Attacks on Data-Intensive Platforms with Configurable Hardware-Assisted Application Rule Enforcement., , and . FPL, page 207-212. IEEE Computer Society, (2011)A hands-on modular laboratory environment to foster learning in control system security., , and . FIE, page 1-9. IEEE Computer Society, (2016)A Methodology for Generating Application-Specific Heterogeneous Processor Arrays., , and . HICSS, IEEE Computer Society, (2006)Detecting and thwarting hardware trojan attacks in cyber-physical systems., , and . CNS, page 421-425. IEEE, (2016)Metawire: Using FPGA configuration circuitry to emulate a Network-on-Chip., , , , , and . FPL, page 257-262. IEEE, (2008)