Author of the publication

Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study.

, , , and . IEEE Symposium on Security and Privacy, page 158-177. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Ph. D. Matthew Millard University of Stuttgart

Die Reflexaktivität der Halsmuskulatur bei seitlichen Fahrmanövern im Fahrsimulator, , , , , , and . dvs-Biomechanik 2023 Tagungsband : Beiträge zur Tagung der dvs-Sektion Biomechanik 2023 an der Otto-von-Guericke-Universität Magdeburg, page 180-182. Stuttgart, Steinbeis-Edition, (2023)
 

Other publications of authors with the same name

Privacy/performance trade-off in private search on bio-medical data., , , and . Future Generation Comp. Syst., (2014)Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques., , , and . J. Parallel Distrib. Comput., 66 (9): 1189-1204 (2006)Hidden messages: evaluating the efficiency of code elision in program navigation., and . Interacting with Computers, 15 (3): 387-407 (2003)An identity-based security infrastructure for Cloud environments., , , , and . WCNIS, page 644-649. IEEE, (2010)Security for service-oriented on-demand grid computing.. University of Marburg, (2008)An Empirical Study of Textual Key-Fingerprint Representations., , , , , and . USENIX Security Symposium, page 193-208. USENIX Association, (2016)Debunking Security-Usability Tradeoff Myths., , , , and . IEEE Security & Privacy, 14 (5): 33-39 (2016)A digital file inventory of the Queens College Special Collections and Archives: Findings, analysis and recommendations for long-term preservation., , , , and . OCLC Systems & Services, 30 (2): 78-90 (2014)Composition and Execution of Secure Workflows in WSRF-Grids., , and . CCGRID, page 122-129. IEEE Computer Society, (2008)A Robust Business Resource Management Framework Based on a Peer-to-Peer Infrastructure., , , and . CEC, page 215-222. IEEE Computer Society, (2005)