Author of the publication

xDEFENSE: an extended DEFENSE for mitigating next generation intrusions (abstract only).

, , and . FPGA, page 253. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Construction of Attack Graphs in Cyber Physical Systems Using Temporal Logic., , , and . MILCOM, page 933-938. IEEE, (2018)Detecting and thwarting hardware trojan attacks in cyber-physical systems., , and . CNS, page 421-425. IEEE, (2016)Enhancing Trust in Reconfigurable Based Hardware Systems with Tags and Monitors., , and . IACR Cryptology ePrint Archive, (2015)Physics-Based Features for Anomaly Detection in Power Grids with Micro-PMUs., , , and . ICC, page 1-7. IEEE, (2018)A Game Theoretic Approach to Multi-radio Multi-channel Assignment in Wireless Networks., , and . WASA, volume 6221 of Lecture Notes in Computer Science, page 203-208. Springer, (2010)Load-aware Traffic Engineering for Mesh Networks., and . ICCCN, page 1040-1045. IEEE, (2007)FIDES: Enhancing trust in reconfigurable based hardware systems., , and . HPEC, page 1-7. IEEE, (2015)Design, implementation and security analysis of Hardware Trojan Threats in FPGA., and . ICC, page 719-724. IEEE, (2014)A systematic study of the delayed column generation method for optimizing wireless networks., , , , and . MobiHoc, page 23-32. ACM, (2014)Moving target defense for Internet of Things using context aware code partitioning and code diversification., and . WF-IoT, page 329-330. IEEE Computer Society, (2016)