Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Java Components Vulnerabilities - An Experimental Classification Targeted at the OSGi Platform, and . CoRR, (2007)Semantic Service Substitution in Pervasive Environments., , and . CoRR, (2015)Vérification automatique pour l'exécution sécurisée de composants Java., and . L'OBJET, 14 (4): 103-127 (2008)Middleware benchmarking: approaches, results, experiences., , , , , , , , , and 1 other author(s). Concurr. Comput. Pract. Exp., 17 (15): 1799-1805 (2005)Supporting the Secure Deployment of OSGi Bundles., and . WOWMOM, page 1-6. IEEE Computer Society, (2007)Un système de gestion d'architextes., and . INFORSID, page 305-325. (1998)Dploiement adaptatif dapplications orientes services sur environnements contraints., , , and . Technique et Science Informatiques, 30 (1): 59-91 (2011)Chasing Data in the Intermediation Era: Economy and Security at Stake., , and . IEEE Secur. Priv., 14 (3): 22-31 (2016)Daisy: Practical Anomaly Detection in large BGP/MPLS and BGP/SRv6 VPN Networks., , , , , and . ANRW, page 8-14. ACM, (2023)Forkmon: Monitoring the Networks Supporting Bitcoin Hard Forks., , and . SRDS Workshops, page 49-54. IEEE, (2019)