Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Temporal Analysis for Adapting Concurrent Applications to Embedded Systems., and . ECRTS, page 71-82. IEEE Computer Society, (2008)Inter-flow consistency: A novel SDN update abstraction for supporting inter-flow constraints., , , and . CNS, page 469-478. IEEE, (2015)Preserving Physical Safety Under Cyber Attacks., , , , , and . IEEE Internet of Things Journal, 6 (4): 6285-6300 (2019)Worst-case execution time analysis of security policies for deeply embedded real-time systems.. SIGBED Review, 5 (1): 8 (2008)REORDER: Securing Dynamic-Priority Real-Time Systems Using Schedule Obfuscation., , , , and . CoRR, (2018)The future of IoT security: special session., , , , , , , and . EMSOFT, page 16. IEEE, (2018)Scheduling, Isolation, and Cache Allocation: A Side-Channel Defense., , , , , and . IC2E, page 34-40. IEEE Computer Society, (2018)A generalized model for preventing information leakage in hard real-time systems., , , , , and . RTAS, page 271-282. IEEE Computer Society, (2015)End-to-End Network Delay Guarantees for Real-Time Systems Using SDN., , , , , , and . RTSS, page 231-242. IEEE Computer Society, (2017)Push-assisted migration of real-time tasks in multi-core processors., , , and . LCTES, page 80-89. ACM, (2009)