Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual machine monitor-based lightweight intrusion detection., , , , , and . ACM SIGOPS Oper. Syst. Rev., 45 (2): 38-53 (2011)PARROT: Power Awareness Through Selective Dynamically Optimized Traces., , , , and . PACS, volume 3164 of Lecture Notes in Computer Science, page 196-214. Springer, (2003)Multi-value Classification of Ambiguous Personal Data., , and . MEDI Workshops, volume 1085 of Communications in Computer and Information Science, page 202-208. Springer, (2019)Characterizing antivirus workload execution., , and . SIGARCH Comput. Archit. News, 33 (1): 90-98 (2005)Effective Virtual Machine Monitor Intrusion Detection Using Feature Selection on Highly Imbalanced Data., , , , , and . ICMLA, page 823-827. IEEE Computer Society, (2010)Hunting Trojan Horses., , , and . ASID, page 12-17. ACM, (2006)Selecting long atomic traces for high coverage., , , and . ICS, page 2-11. ACM, (2003)Data Minimization for GDPR Compliance in Machine Learning Models., , , , and . CoRR, (2020)Towards a GDPR compliant way to secure European cross border Healthcare Industry 4.0., , , and . Comput. Stand. Interfaces, (2020)On the complexity of Jensen's algorithm for counting fixed polyominoes., and . J. Discrete Algorithms, 5 (2): 348-355 (2007)