Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Zero-Cost In-Depth Enforcement of Network Policies for Low-Latency Cloud-Native Systems., , , , and . CLOUD, page 249-261. IEEE, (2023)Exploring the Environmental Benefits of In-Process Isolation for Software Resilience., , , and . DSN-S, page 203-205. IEEE, (2023)A Case Study in Information Flow Refinement for Low Level Systems., , , , and . The Logic of Software. A Tasting Menu of Formal Methods, volume 13360 of Lecture Notes in Computer Science, page 54-79. Springer, (2022)Performance Analysis and Optimizations of ERO2.0 Fusion Code., , , , and . PASC, page 18:1-18:11. ACM, (2024)Film in der Hochschullehre, and . (2015)Network Policies in Kubernetes: Performance Evaluation and Security Analysis., , , , and . EuCNC/6G Summit, page 407-412. IEEE, (2021)Compositional Verification of Security Properties for Embedded Execution Platforms., , and . PROOFS, volume 49 of EPiC Series in Computing, page 1-16. EasyChair, (2017)Rewind & Discard: Improving Software Resilience using Isolated Domains., , , and . DSN, page 402-416. IEEE, (2023)On Compositional Information Flow Aware Refinement., , , and . CSF, page 1-16. IEEE, (2021)Towards Intent-Based Scheduling for Performance and Security in Edge-to-Cloud Networks., , , , , and . ICIN, page 222-227. IEEE, (2024)