Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Docker Security.. CoRR, (2015)GPASS: A Password Manager with Group-Based Access Control., and . NordSec, volume 10674 of Lecture Notes in Computer Science, page 229-244. Springer, (2017)Security Failures in Modern Software.. Aalto University, Espoo, Finland, (2021)base-search.net (ftaaltouniv:oai:aaltodoc.aalto.fi:123456789/104934).Ergo, SMIRK is Safe: A Safety Case for a Machine Learning Component in a Pedestrian Automatic Emergency Brake System., , , , , , , , , and . CoRR, (2022)Designing HMIs for an active safety system on bicycles., , , , , , and . AutomotiveUI (adjunct), page 125-129. ACM, (2019)Analysis of Topology Poisoning Attacks in Software-Defined Networking., , and . NordSec, volume 11875 of Lecture Notes in Computer Science, page 87-102. Springer, (2019)XSS Vulnerabilities in Cloud-Application Add-Ons., , , and . AsiaCCS, page 610-621. ACM, (2020)Building a Hyperspectral Library and its Incorporation into Sparse Unmixing for Mineral Identification., , , , , , , , , and 9 other author(s). IGARSS, page 4261-4264. IEEE, (2018)Application of Public Ledgers to Revocation in Distributed Access Control., and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 781-792. Springer, (2018)Application of Public Ledgers to Revocation in Distributed Access Control., and . CoRR, (2016)