Author of the publication

Real-Time Systems Security through Scheduler Constraints.

, , , and . ECRTS, page 129-140. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-Time Systems Security through Scheduler Constraints., , , and . ECRTS, page 129-140. IEEE Computer Society, (2014)A framework integrating attribute-based policies into role-based access control., , , and . SACMAT, page 187-196. ACM, (2012)An empirical study on the software integrity of virtual appliances: are you really getting what you paid for?, , , , , , and . AsiaCCS, page 231-242. ACM, (2013)A generalized model for preventing information leakage in hard real-time systems., , , , , and . RTAS, page 271-282. IEEE Computer Society, (2015)Evidence of log integrity in policy-based security monitoring., , , , and . DSN Workshops, page 1-6. IEEE Computer Society, (2012)Assessing software integrity of virtual appliances through software whitelists., , , , , , and . NDSS, The Internet Society, (2013)Limiting Data Exposure in Monitoring Multi-domain Policy Conformance., , , and . TRUST, volume 7904 of Lecture Notes in Computer Science, page 65-82. Springer, (2013)Third International Workshop on Dependable and Secure Machine Learning - DSML 2020., , , , , , and . DSN Workshops, page x. IEEE, (2020)Power flow cyber attacks and perturbation-based defense., , , and . SmartGridComm, page 342-347. IEEE, (2012)BERT Lost Patience Won't Be Robust to Adversarial Slowdown., , , and . CoRR, (2023)