Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Naming System Venture. (2001)http://www.namesys.com/whitepaper.html.Aesthetic considerations unique to interactive multimedia., and . IEEE Computer Graphics and Applications, 15 (3): 24-28 (1995)Simulating BFT Protocol Implementations at Scale., , and . CoRR, (2022)Enhancing ReiserFS Security In Linux.. DISCEX (2), page 188-. IEEE Computer Society, (2003)Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection., , and . NordSec, volume 11252 of Lecture Notes in Computer Science, page 255-271. Springer, (2018)An Evaluation of Blockchain Application Requirements and Their Satisfaction in Hyperledger Fabric: A Practical Experience Report., , and . DAIS, volume 13272 of Lecture Notes in Computer Science, page 3-20. Springer, (2022)Scalable Performance Evaluation of Byzantine Fault-Tolerant Systems Using Network Simulation., , and . PRDC, page 180-190. IEEE, (2023)Utilizing Similarity for Improved Intrusion Detection: Autonomous Community Formation for Practical Heterogeneity Management., and . PRDC, page 247-249. IEEE, (2023)Towards Hypervisor Support for Enhancing the Performance of Virtual Machine Introspection., and . DAIS, volume 12135 of Lecture Notes in Computer Science, page 41-54. Springer, (2020)LiveCloudInspector: Towards Integrated IaaS Forensics in the Cloud., and . DAIS, volume 9038 of Lecture Notes in Computer Science, page 207-220. Springer, (2015)