Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy., , , and . IEEE Symposium on Security and Privacy, page 3-13. IEEE Computer Society, (2010)The IEEE Symposium on Security and Privacy, in Retrospect., , and . IEEE Security & Privacy, 12 (3): 15-17 (2014)Case Studies of an Insider Framework., , , , and . HICSS, page 1-10. IEEE Computer Society, (2009)Iterative Analysis to Improve Key Properties of Critical Human-Intensive Processes: An Election Security Example., , , , , , , and . ACM Trans. Priv. Secur., 20 (2): 5:1-5:31 (2017)Anomaly Detection Using Optimally-Placed Micro-PMU Sensors in Distribution Grids., , , , , , and . CoRR, (2017)Towards a Self-Adaptive Middleware for Building Reliable Publish/Subscribe Systems., , and . IDCS, volume 9258 of Lecture Notes in Computer Science, page 157-168. Springer, (2015)Quis Custodiet ipsos Custodes?: a new paradigm for analyzing security paradigms with appreciation to the Roman poet Juvenal., , , and . NSPW, page 71-84. ACM, (2009)We have met the enemy and he is us., , , , and . NSPW, page 1-12. ACM, (2008)Blockchain as a Trusted Component in Cloud SLA Verification., , , and . UCC Companion, page 93-100. ACM, (2019)Unsafe at Any Clock Speed: The Insecurity of Computer System Design, Implementation, and Operation.. IEEE Secur. Priv., 20 (1): 4-9 (2022)