Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine Learning for Security at the IoT Edge - A Feasibility Study., , , and . MASS Workshops, page 7-12. IEEE, (2019)Dynamic Voting based Explainable Intrusion Detection System for In-vehicle Network., , and . ICACT, page 406-411. IEEE, (2022)Systematic Evaluation of Automotive Intrusion Detection Datasets., , and . CSCS, page 6:1-6:12. ACM, (2022)Faster enclave transitions for IO-intensive network applications., , and . SPIN@SIGCOMM, page 1-8. SPIN@ACM, (2021)SoK: Confidential Quartet - Comparison of Platforms for Virtualization-Based Confidential Computing., , and . SEED, page 109-120. IEEE, (2022)SGX-Bundler: speeding up enclave transitions for IO-intensive applications., , and . CCGRID, page 269-278. IEEE, (2022)Efficient Analysis of Large Discrete-Event Systems with Binary Decision Diagrams., , and . CDC/ECC, page 2751-2756. IEEE, (2005)Efficient supervisory synthesis of large systems, , and . Control Engineering Practice, 14 (10): 1157--1167 (October 2006)Coordination of batches in flexible production., , and . ACC, page 2735-2739. IEEE, (2000)Efficient application of symbolic tools for resource booking problems., , , and . ACC, page 4937-4942. IEEE, (2001)