Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HInjector: Injecting Hypercall Attacks for Evaluating VMI-based Intrusion Detection Systems, , , , and . The 2013 Annual Computer Security Applications Conference (ACSAC 2013), Maryland, USA, Applied Computer Security Associates (ACSA), (March 2013)OIDC-TCI: OIDC with Trust Context Information., , and . WMNC, page 54-61. IEEE, (2022)On Applying FMEA to SOAs: A Proposal and Open Challenges., , and . SERENE, volume 8785 of Lecture Notes in Computer Science, page 86-100. Springer, (2014)The Impact of Data Preparation on the Fairness of Software Systems., , and . ISSRE, page 391-401. IEEE, (2019)Software Testing Strategies for Detecting Hypercall Handlers' Aging-related Bugs., , , , , and . ISSRE Workshops, page 48-55. IEEE, (2021)A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate., , , , and . MedComNet, page 1-8. IEEE, (2020)Towards a Robustness Assessment Methodology for IoT Systems., , and . LADC, page 1-4. IEEE, (2021)SOA-Scanner: An Integrated Tool to Detect Vulnerabilities in Service-Based Infrastructures., and . IEEE SCC, page 280-287. IEEE Computer Society, (2013)Using NLP and Machine Learning to Detect Data Privacy Violations., , , , and . INFOCOM Workshops, page 972-977. IEEE, (2020)Experimenting Machine Learning Techniques to Predict Vulnerabilities., , and . LADC, page 151-156. IEEE Computer Society, (2016)