Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative Analysis of Active Cyber Defenses Based on Temporal Platform Diversity., , and . CoRR, (2014)FirmFuzz: Automated IoT Firmware Introspection and Analysis., , , , , and . IoT S&P@CCS, page 15-21. ACM, (2019)BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems., , , , , and . RAID, volume 10453 of Lecture Notes in Computer Science, page 311-333. Springer, (2017)MyABDAC: compiling XACML policies for attribute-based database access control., , , and . CODASPY, page 97-108. ACM, (2011)Covert channel resistant information leakage protection using a multi-agent architecture., , , and . IET Information Security, 4 (4): 233-247 (2010)Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity., , , , , , and . ACM Conference on Computer and Communications Security, page 901-913. ACM, (2015)Dedicated vs. distributed: A study of mission survivability metrics., , , , and . MILCOM, page 1345-1350. IEEE, (2011)On the Challenges of Effective Movement., , , , and . MTD@CCS, page 41-50. ACM, (2014)Data diodes in support of trustworthy cyber infrastructure., and . CSIIRW, page 23. ACM, (2010)On the Effectiveness of Type-based Control Flow Integrity., , , , , and . ACSAC, page 28-39. ACM, (2018)