Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

QFlip : An Adaptive Reinforcement Learning Strategy for the FlipIt Security Game., and . GameSec, volume 11836 of Lecture Notes in Computer Science, page 364-384. Springer, (2019)CCSW 2014: Sixth ACM Cloud Computing Security Workshop., and . ACM Conference on Computer and Communications Security, page 1560-1561. ACM, (2014)An Epidemiological Study of Malware Encounters in a Large Enterprise., , , , and . ACM Conference on Computer and Communications Security, page 1117-1130. ACM, (2014)Exploring Backdoor Poisoning Attacks Against Malware Classifiers., , , and . CoRR, (2020)Space-Efficient Block Storage Integrity., and . NDSS, The Internet Society, (2005)Integrity Checking in Cryptographic File Systems with Constant Trusted Storage., and . USENIX Security Symposium, USENIX Association, (2007)On Consistency of Encrypted Files., and . DISC, volume 4167 of Lecture Notes in Computer Science, page 254-268. Springer, (2006)Dynamic range enhancement of consumer digital camera acquired hip prosthesis X-ray images., , , and . EUSIPCO, page 1103-1106. IEEE, (2007)MOSAIC: A Platform for Monitoring and Security Analytics in Public Clouds., , , and . SecDev, page 69-70. IEEE Computer Society, (2016)Operational Security Log Analytics for Enterprise Breach Detection., and . SecDev, page 15-22. IEEE Computer Society, (2016)