Author of the publication

Triage of IoT Attacks Through Process Mining.

, , , , and . OTM Conferences, volume 11877 of Lecture Notes in Computer Science, page 326-344. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A theoretical evaluation of peer-to-peer internal clock synchronization., , , and . Autonomics, page 1. ICST, (2008)Principled Composition of Function Variants for Dynamic Software Diversity and Program Protection., , and . ASE, page 183:1-183:5. ACM, (2022)Virtual Tree: A Robust Overlay Network for Ensuring Interval Valid Queries in Dynamic Distributed Systems., , , and . ICDCN, volume 7129 of Lecture Notes in Computer Science, page 197-200. Springer, (2012)Structure-less content-based routing in mobile ad hoc networks., , , , and . ICPS, page 37-46. IEEE Computer Society, (2005)On The Accuracy of Event Distribution Lists for Publish/Subscribe in Dynamic Distributed Systems., , , , , and . ICDCS Workshops, page 31. IEEE Computer Society, (2006)Android malware family classification based on resource consumption over time., , , , , and . MALWARE, page 31-38. IEEE Computer Society, (2017)Harnessing the power of DHTs to build dynamic quorums in large-scale enterprise infrastructures., , , , and . LADIS, page 5:1-5:7. ACM, (2008)Synchronous Byzantine Lattice Agreement in O(log(f) Rounds., , , and . ICDCS, page 146-156. IEEE, (2020)SoK: Cybersecurity Regulations, Standards and Guidelines for the Healthcare Sector., , , and . ISI, page 1-6. IEEE, (2023)Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization., , , and . CCS, page 715-733. ACM, (2021)