Author of the publication

AWSomePy: A Dataset and Characterization of Serverless Applications.

, , , and . SESAME@EuroSys, page 50-56. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bypassing information leakage protection with trusted applications., , , and . Comput. Secur., 31 (4): 557-568 (2012)Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming., , and . ARES, page 327-332. IEEE Computer Society, (2010)WEVAN - A mechanism for evidence creation and verification in VANETs., , , and . J. Syst. Archit., 59 (10-B): 985-995 (2013)A framework for avoiding steganography usage over HTTP., , , and . J. Netw. Comput. Appl., 35 (1): 491-501 (2012)A multi-agent scanner to detect stored-XSS vulnerabilities., , , and . ICITST, page 1-6. IEEE, (2010)Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families., , , and . Expert Syst. Appl., 41 (4): 1104-1117 (2014)Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles., , , and . Int. J. Distributed Sens. Networks, (2014)CSteg: Talking in C Code - Steganography of C Source Code in Text., , , and . SECRYPT, page 399-406. INSTICC Press, (2008)A Low Energy Profile: Analysing Characteristic Security on BLE Peripherals., and . CODASPY, page 152-154. ACM, (2018)Analysis of update delays in signature-based network intrusion detection systems., , and . Comput. Secur., 30 (8): 613-624 (2011)