Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linking Contexts from Distinct Data Sources in Zero Trust Federation., , and . ETAA, volume 13782 of Lecture Notes in Computer Science, page 136-144. Springer, (2022)Centralized Control of Account Migration at Single Sign-On in Shibboleth., and . J. Inf. Process., (2021)A tight bound on online buffer management for two-port shared-memory switches., , and . SPAA, page 358-364. ACM, (2007)Design and Implementation of a Web-Based Internet Broadcasting System on QoS Multicast Routers., , , , and . ASIAN, volume 2550 of Lecture Notes in Computer Science, page 195-205. Springer, (2002)Acila: attaching identities of workloads for efficient packet classification in a cloud data center network., , , , and . FIRA@SIGCOMM, page 79-85. ACM, (2022)Message from the IWFIT 2018 Workshop Organizers., , and . COMPSAC (2), page 762. IEEE Computer Society, (2018)978-1-5386-2667-2.Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with Darknet., , and . COMPSAC (2), page 658-663. IEEE Computer Society, (2018)978-1-5386-2667-2.Mutual Secrecy of Attributes and Authorization Policies in Identity Federation., and . COMPSAC, page 1202-1209. IEEE, (2021)Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote Shellcodes., , , , , , and . COMPSAC (2), page 471-476. IEEE, (2019)Detection of Bots in CAPTCHA as a Cloud Service Utilizing Machine Learning., , , and . ICOIN, page 584-589. IEEE, (2020)