Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

E-participation in the Planning Process., , and . IV, page 701-706. IEEE Computer Society, (2004)UCX: An Open Source Framework for HPC Network APIs and Beyond., , , , , , , , , and 10 other author(s). Hot Interconnects, page 40-43. IEEE Computer Society, (2015)Mind the Gap: On Bridging the Semantic Gap between Machine Learning and Malware Analysis., , , , , , , , , and . AISec@CCS, page 49-60. ACM, (2020)Towards robust trust in software defined networks., and . GLOBECOM Workshops, page 166-171. IEEE, (2014)Policy-based Security Provisioning and Performance Control in the Cloud., , , , , and . CLOSER, page 502-508. SciTePress, (2013)Neurogenesis deep learning: Extending deep networks to accommodate new classes., , , , , , , , and . IJCNN, page 526-533. IEEE, (2017)Dynamic Analysis of Executables to Detect and Characterize Malware., , , , , , and . ICMLA, page 16-22. IEEE, (2018)QoS Performance Evaluation of Disjoint Queue Scheduler for Video-Applications over LTE-A HetNets., , , , and . ICCCNT, page 4:1-4:7. ACM, (2016)Usage Management of Personal Health Records, , and . CoRR, (2012)Dependency Graph Analysis and Moving Target Defense Selection., and . MTD@CCS, page 105-116. ACM, (2016)