Author of the publication

Digging for Dark IPMI Devices: Advancing BMC Detection and Evaluating Operational Security.

, , and . TMA, IFIP, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Amplification Threat Posed by PubliclyReachable BACnet Devices., , , , , and . J. Cyber Secur. Mobil., 6 (1): 77-104 (2017)Environment Modeling and Abstraction of Network States for Cognitive Functions., , , and . NOMS, page 1-8. IEEE, (2020)Efficient Dynamic Flow Tracking for Packet Analyzers., , , and . CloudNet, page 1-6. IEEE, (2018)The Case for Writing Network Drivers in High-Level Programming Languages., , , , , , , , , and 1 other author(s). ANCS, page 1-13. IEEE, (2019)EnGINE: Flexible Research Infrastructure for Reliable and Scalable Time Sensitive Networks., , , , , , , , , and 1 other author(s). J. Netw. Syst. Manag., 30 (4): 74 (2022)Predicting Latency Quantiles using Network Calculus-assisted GNNs., and . GNNet@CoNEXT, page 13-18. ACM, (2023)Priority-aware Inter-Server Receive Side Scaling., , , , , and . PDP, page 51-58. IEEE, (2023)Key Properties of Programmable Data Plane Targets., , , and . ITC, page 114-122. IEEE, (2020)Scalable TCP Throughput Limitation Monitoring., , , , and . IM, page 410-416. IEEE, (2021)Robust Deep Learning against Corrupted Data in Cognitive Autonomous Networks., , , and . NOMS, page 1-7. IEEE, (2022)