Author of the publication

Rootkit detection through phase-space analysis of power voltage measurements.

, , , , , and . MALWARE, page 19-27. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strategies for Ensuring High Availability Cloud Services.. AMCIS, Association for Information Systems, (2015)Perceived Value of Podcasting: Student Communication-Medium Preferences., , , , and . AMCIS, page 271. Association for Information Systems, (2006)Assessing the Integrity of Mobile Platform-Based Sensor Data Pipelines., and . ISDFS, page 1-6. IEEE, (2024)Analyzing Risks to Internal Developer Platforms., and . AMCIS, Association for Information Systems, (2024)Extending the Cloud with Fog: Security Challenges & Opportunities.. AMCIS, Association for Information Systems, (2014)Uncertainty, Personality, and Attitudes toward DevOps., , and . AMCIS, Association for Information Systems, (2017)The IT Security Adoption Conundrum: An Initial Step Toward Validation of Applicable Measures., , and . AMCIS, page 276. Association for Information Systems, (2007)Identifying Traits and Values of Top-Performing Information Security Personnel., and . J. Comput. Inf. Syst., 57 (3): 258-268 (2017)Analysis of Monolithic and Microkernel Architectures: Towards Secure Hypervisor Design.. HICSS, page 5008-5017. IEEE Computer Society, (2014)Near-Real-Time IDS for the U.S. FAA's NextGen ADS-B., , , , , , and . Big Data Cogn. Comput., 5 (2): 27 (2021)