Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Malicious Potential of Xilinx' Internal Configuration Access Port (ICAP)., , , , , and . ICFPT, page 1. IEEE, (2023)Customizing virtual networks with partial FPGA reconfiguration., , , , and . VISA@SIGCOMM, page 57-64. ACM, (2010)Precise Fault Injection to Enable DFIA for Attacking AES in Remote FPGAs., , and . FCCM, page 1-5. IEEE, (2022)First observations with the UMass dual-beam InSAR., , , , , , , and . IGARSS, page 530-532. IEEE, (2003)Closed-Loop Proportion-Derivative Control of Suppressing Seizures in a Neural Mass Model., , , , , and . ISCAS, page 1-5. IEEE, (2019)Jitter-based Adaptive True Random Number Generation for FPGAs in the Cloud., , , , and . FPT, page 112-119. IEEE, (2020)Service Chaining for Heterogeneous Middleboxes., and . FPT, page 263-267. IEEE, (2020)Lynq: A Lightweight Software Layer for Rapid SoC FPGA Prototyping., , , and . FPL, page 372-375. IEEE Computer Society, (2018)NestedNet: A Container-based Prototyping Tool for Hierarchical Software Defined Networks., , and . RSP, page 1-7. IEEE, (2020)Characterizing Power Distribution Attacks in Multi-User FPGA Environments., , and . FPL, page 194-201. IEEE, (2019)