Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provenance for Intent-Based Networking., , and . NetSoft, page 195-199. IEEE, (2020)Runtime Analysis of Whole-System Provenance., , , , , , , and . ACM Conference on Computer and Communications Security, page 1601-1616. ACM, (2018)A Provenance Model for the European Union General Data Protection Regulation., , and . IPAW, volume 11017 of Lecture Notes in Computer Science, page 45-57. Springer, (2018)Ellipsis: Towards Efficient System Auditing for Real-Time Systems., , , , , and . CoRR, (2022)Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks., , , , , and . CCS, page 3337-3351. ACM, (2021)Accountable wiretapping - or - I know they can hear you now., , , , , and . J. Comput. Secur., 23 (2): 167-195 (2015)Tactical Provenance Analysis for Endpoint Detection and Response Systems., , and . SP, page 1172-1189. IEEE, (2020)Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations., , and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 166-185. Springer, (2022)Skill Squatting Attacks on Amazon Alexa., , , , , , and . USENIX Security Symposium, page 33-47. USENIX Association, (2018)Making USB Great Again with USBFILTER., , , , and . USENIX Security Symposium, page 415-430. USENIX Association, (2016)