Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forensic Analysis of Configuration-based Attacks., , , , , , and . NDSS, The Internet Society, (2022)Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises., , , , , , , and . RAID, volume 10453 of Lecture Notes in Computer Science, page 287-310. Springer, (2017)FORTIFY: Software Defined Data Plane Resilience., , , , , , , and . NFV-SDN, page 6-12. IEEE, (2022)PACED: Provenance-based Automated Container Escape Detection., , , , , , , , , and . IC2E, page 261-272. IEEE, (2022)Poster Abstract: BounceBack - A DDoS Attack Using Unsuspecting Accomplices in the Network., , , , and . INFOCOM Workshops, page 1-2. IEEE, (2021)Using SGX-Based Virtual Clones for IoT Security., , , , and . NCA, page 1-4. IEEE, (2018)Identifying the provenance of correlated anomalies., , , , , , and . SAC, page 224-229. ACM, (2011)The Browsers Strike Back: Countering Cryptojacking and Parasitic Miners on the Web., , , , , and . INFOCOM, page 703-711. IEEE, (2019)Proactive abuse prevention in clouds. University of Illinois Urbana-Champaign, USA, (2018)Sneak-Peek: High speed covert channels in data center networks., , , , , , , , and . INFOCOM, page 1-9. IEEE, (2016)