Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-sensor Data Fusion Approach for Detecting Direct Debit Frauds., , , , , and . INCoS, page 480-485. IEEE, (2016)Privacy Preserving Intrusion Detection Via Homomorphic Encryption., , , , , , and . WETICE, page 321-326. IEEE, (2019)SIL2 assessment of an Active/Standby COTS-based Safety-Related system., , , , and . Reliab. Eng. Syst. Saf., (2018)The Alliance of HE and TEE to Enhance their Performance and Security., , , , , and . CSR, page 641-647. IEEE, (2023)Data Collection Framework - A Flexible and Efficient Tool for Heterogeneous Data Acquisition., , , , , and . CLOSER (1), page 374-379. SciTePress, (2016)Cloudifying Critical Applications: A Use Case from the Power Grid Domain., , , , , , , and . PDP, page 363-370. IEEE Computer Society, (2017)Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level., , , , and . EDCC, page 17-24. IEEE Computer Society, (2018)Direct Debit Frauds: A Novel Detection Approach., , , , , and . CLOSER (1), page 380-387. SciTePress, (2016)SGXTuner: Performance Enhancement of Intel SGX Applications Via Stochastic Optimization., , , and . IEEE Trans. Dependable Secur. Comput., 19 (4): 2595-2608 (2022)Integrating Reactive Cloud Applications in SERECA., , , , and . ARES, page 39:1-39:8. ACM, (2017)