Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards longitudinal analysis of a population's electronic health records using factor graphs., , , , , and . BDCAT, page 79-86. ACM, (2016)GateKeeper: Operator-centric Trusted App Management Framework on ARM TrustZone., , , , , , and . CNS, page 100-108. IEEE, (2022)Reflections on Industry Trends and Experimental Research in Dependability., , and . IEEE Trans. Dependable Secur. Comput., 1 (2): 109-127 (2004)Analysis of Safety-Critical Computer Failures in Medical Devices, , , and . IEEE Security & Privacy, 11 (4): 14--26 (July 2013)Active Replication of Multithreaded Applications., , and . IEEE Trans. Parallel Distributed Syst., 17 (5): 448-465 (2006)Systems-theoretic Safety Assessment of Robotic Telesurgical Systems., , , , and . CoRR, (2015)Failure Data Analysis of a LAN of Windows NT based Computers., , and . SRDS, page 178-187. IEEE Computer Society, (1999)Automatic Generation of Security Argument Graphs., , , , , , and . PRDC, page 33-42. IEEE Computer Society, (2014)Quantitative Analysis of Long-Latency Failures in System Software., , and . PRDC, page 23-30. IEEE Computer Society, (2009)Error-Injection-Based Failure Characterization of the IEEE 1394 Bus., , , , and . IOLTS, page 202-. IEEE Computer Society, (2003)