Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Vanessa Costalonga Martins University of Stuttgart

Towards Modular Natural Fiber-Reinforced Polymer Architecture, , , , and . Distributed Proximities : Proceedings of the 40th Annual Conference of the Association of Computer Aided Design in Architecture, Volume I : Technical papers, keynote conversations, page 564-573. Philadelphia, Association for Computer Aided Design in Architecture (ACADIA), (2020)

Anh Chu University of Stuttgart

A 263GHz 32-Channel EPR-on-a-Chip Injection-Locked VCO-Array, , , , and . 2023 IEEE International Solid-State Circuits Conference (ISSCC), page 20-22. IEEE, (2023)
 

Other publications of authors with the same name

Designing an Optimized Alert System Based on Geospatial Location Data., , and . HICSS, page 4159-4168. IEEE Computer Society, (2014)Internet Security: Intrusion Detection and Prevention: Minitrack Introduction., and . HICSS, IEEE Computer Society, (2004)Reflections on Operating in Hostile Environments., , and . HICSS, IEEE Computer Society, (2004)Leveraging Cognitive Principles to Improve Security Visualization., , , and . NDT (2), volume 294 of Communications in Computer and Information Science, page 262-276. Springer, (2012)DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target Defenses., , , and . MTD@CCS, page 77-84. ACM, (2015)The privacy implications of stateless IPv6 addressing., , , and . CSIIRW, page 52. ACM, (2010)Changing the Game: A Micro Moving Target IPv6 Defense for the Internet of Things., , , and . IEEE Wireless Commun. Letters, 7 (4): 578-581 (2018)The Blind Man's Bluff Approach to Security Using IPv6., , , , and . IEEE Security & Privacy, 10 (4): 35-43 (2012)Mobile Device Profiling and Intrusion Detection Using Smart Batteries., , , , , and . HICSS, page 296. IEEE Computer Society, (2008)Utilizing the BitTorrent DHT for blind rendezvous and information exchange., , , and . MILCOM, page 1560-1565. IEEE, (2015)