Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threat-Based Security Analysis for the Internet of Things., and . SIoT, page 35-43. IEEE Computer Society, (2014)Aware: Controlling App Access to I/O Devices on Mobile Platforms., , , , and . CoRR, (2016)Partitioning the trusted computing base of applications on commodity systems.. University of Oxford, UK, (2017)British Library, EThOS.Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home., , and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 255-267. Springer, (2016)AuDroid: Preventing Attacks on Audio Channels in Mobile Devices., , , and . CoRR, (2016)IO-Trust: An out-of-band trusted memory acquisition for intrusion detection and Forensics investigations in cloud IOMMU based systems., , and . ARES, page 45:1-45:6. ACM, (2019)DL2Fence: Integrating Deep Learning and Frame Fusion for Enhanced Detection and Localization of Refined Denial-of-Service in Large-Scale NoCs., , , and . CoRR, (2024)AuDroid: Preventing Attacks on Audio Channels in Mobile Devices., , , and . ACSAC, page 181-190. ACM, (2015)Live system call trace reconstruction on Linux., , and . Digit. Investig., 42 (Supplement): 301398 (2022)One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices., , , , , and . CoRR, (2024)