Author of the publication

Towards Bridging the Gap between Modern and Legacy Automotive ECUs: A Software-Based Security Framework for Legacy ECUs.

, , , and . CAVS, page 1-5. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Niflheim: End-to-End Middleware for Applications Across all Tiers of the IoT., , , and . SenSys, page 41:1-41:2. ACM, (2017)Towards Bridging the Gap between Modern and Legacy Automotive ECUs: A Software-Based Security Framework for Legacy ECUs., , , and . CAVS, page 1-5. IEEE, (2019)Increasing user participation: An exploratory study of querying on the Facebook and Twitter platforms., , , , and . First Monday, (2014)A Survey of Security and Privacy Issues in V2X Communication Systems., , , , , , and . ACM Comput. Surv., 55 (9): 185:1-185:36 (2023)Poster Abstract: Adapting Pretrained Features for Efficient Unsupervised Acoustic Anomaly Detection., , , and . IPSN, page 525-526. IEEE, (2022)Niflheim: An end-to-end middleware for applications on a multi-tier IoT infrastructure., , , and . NCA, page 209-216. IEEE Computer Society, (2017)Dynamic QoS support for IoT backhaul networks through SDN., , , , and . FMEC, page 187-192. IEEE, (2018)Keynote I.. EUSPN/ICTH, volume 141 of Procedia Computer Science, page 6. Elsevier, (2018)μPnP-WAN: Wide area plug and play sensing and actuation with LoRa., , , , , and . ISOCC, page 225-226. IEEE, (2016)Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devices., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (2): 1124-1138 (March 2023)