Author of the publication

Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach.

, , and . IEEE Symposium on Security and Privacy, page 175-187. IEEE Computer Society, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Maurice Koch University of Stuttgart

Dataset for "How Deep Is Your Gaze? Leveraging Distance in Image-Based Gaze Analysis", , , and . Dataset, (2024)Related to: Maurice Koch, Nelusa Pathmanathan, Daniel Weiskopf, and Kuno Kurzhals.2024. How Deep Is Your Gaze? Leveraging Distance in Image-Based GazeAnalysis. In 2024 Symposium on Eye Tracking Research and Applications(ETRA ’24), June 04–07, 2024, Glasgow, United Kingdom. ACM, New York,NY, USA, 7 pages. doi: 10.1145/3649902.3653349.
 

Other publications of authors with the same name

Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach., , and . IEEE Symposium on Security and Privacy, page 175-187. IEEE Computer Society, (1997)Noninterference and Intrusion Detection., and . IEEE Symposium on Security and Privacy, page 177-187. IEEE Computer Society, (2002)Analysis of an Algorithm for Distributed Recognition and Accountability., , , , , , and . ACM Conference on Computer and Communications Security, page 154-164. ACM, (1993)System Health and Intrusion Monitoring: Technology Description.. DISCEX (2), page 27-29. IEEE Computer Society, (2003)Measuring denial Of service., , , , , , and . QoP, page 53-58. ACM, (2006)Tools for worm experimentation on the DETER testbed., , , and . IJCNDS, 5 (1/2): 151-171 (2010)DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET., , , and . RAID, volume 4219 of Lecture Notes in Computer Science, page 249-271. Springer, (2006)SEER: A Security Experimentation EnviRonment for DETER., , and . DETER, USENIX Association, (2007)Tools for worm experimentation on the DETER testbed., , , and . TRIDENTCOM, page 1-10. IEEE Computer Society, (2009)Challenges in Intrusion Detection for Wireless Ad-hoc Networks., and . SAINT Workshops, page 368-373. IEEE Computer Society, (2003)