Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trusted Computing Architectures for IoT Devices., , , , , , , , , and 1 other author(s). ARC, volume 14553 of Lecture Notes in Computer Science, page 241-254. Springer, (2024)SoK - Network Intrusion Detection on FPGA., , , , , and . SPACE, volume 13162 of Lecture Notes in Computer Science, page 242-261. Springer, (2021)SHeLA: Scalable Heterogeneous Layered Attestation., , , , and . IEEE Internet Things J., 6 (6): 10240-10250 (2019)Remote Attestation as a Service for IoT., , , , and . IoTSMS, page 320-325. IEEE, (2019)SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things., , , and . WiMob, page 1-8. IEEE, (2018)SACHa: Self-Attestation of Configurable Hardware., , , and . DATE, page 746-751. IEEE, (2019)Toward secure and efficient attestation for highly dynamic swarms: poster., , , , and . WISEC, page 281-282. ACM, (2017)Yes we CAN!: Towards bringing security to legacy-restricted Controller Area Networks. A review., , , and . CF, page 352-357. ACM, (2023)SHeFU: Secure Hardware-Enabled Protocol for Firmware Updates., , , and . ISCAS, page 1-5. IEEE, (2020)Evaluation of Lightweight Machine Learning-Based NIDS Techniques for Industrial IoT., , , , and . ACNS Workshops (1), volume 14586 of Lecture Notes in Computer Science, page 246-264. Springer, (2024)