Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Safety and Efficiency of Virtual Firewall Elasticity Control., , , , , , and . NDSS, The Internet Society, (2017)Understanding and Detecting Remote Infection on Linux-based IoT Devices., , , , , , and . AsiaCCS, page 873-887. ACM, (2022)A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications., , , , , , and . AAMAS, page 178-186. ACM, (2017)EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices., , , , , and . CCS, page 2931-2945. ACM, (2022)Discovering and Using Patterns for Countering Security Challenges.. Arizona State University, Tempe, USA, (2014)base-search.net (ftarizonastateun:item:26801).An Investigation of Large Language Models for Real-World Hate Speech Detection., , , , , , and . ICMLA, page 1568-1573. IEEE, (2023)SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms., , , , , and . CODASPY, page 161-163. ACM, (2018)The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS., , , and . CHASE, page 94-99. ACM / IEEE, (2018)SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam., , , and . IEEE Symposium on Security and Privacy, page 320-338. IEEE Computer Society, (2016)ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems., , , and . MSCPES@CPSIoTWeek, page 1-6. IEEE, (2019)