Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Experience in Testing the Security of Real-World Electronic Voting Systems., , , , , , , and . IEEE Trans. Software Eng., 36 (4): 453-473 (2010)Stateful Intrusion Detection for High-Speed Networks., , , and . S&P, page 285-293. IEEE Computer Society, (2002)Bayesian Event Classification for Intrusion Detection., , , and . ACSAC, page 14-23. IEEE Computer Society, (2003)Are your votes really counted?: testing the security of real-world electronic voting systems., , , , , , , and . ISSTA, page 237-248. ACM, (2008)Designing and implementing a family of intrusion detection systems., , and . ESEC / SIGSOFT FSE, page 88-97. ACM, (2003)Static Disassembly of Obfuscated Binaries., , , and . USENIX Security Symposium, page 255-270. USENIX, (2004)Anomalous system call detection., , , and . ACM Trans. Inf. Syst. Secur., 9 (1): 61-93 (2006)On the Detection of Anomalous System Call Arguments., , , and . ESORICS, volume 2808 of Lecture Notes in Computer Science, page 326-343. Springer, (2003)Composable Tools For Network Discovery and Security Analysis., , , and . ACSAC, page 14-24. IEEE Computer Society, (2002)Topology-Based Detection of Anomalous BGP Messages., , , and . RAID, volume 2820 of Lecture Notes in Computer Science, page 17-35. Springer, (2003)