Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Standardizing Component Interaction Patterns in Product-Lines Architectures., and . ECOOP Workshops, volume 1743 of Lecture Notes in Computer Science, page 197. Springer, (1999)Real-time Distributed In-Situ Benchmarking of Energy Harvesting IoT Devices., , , and . M4IoT@Middleware, page 19-24. ACM, (2018)Improving Memory Management Security for C and C++., , , and . Int. J. Secur. Softw. Eng., 1 (2): 57-82 (2010)SμV - the security microvisor: a virtualisation-based security middleware for the internet of things., , , , , and . Middleware Industry, page 36-42. ACM, (2017)TabShots: client-side detection of tabnabbing attacks., , , and . AsiaCCS, page 447-456. ACM, (2013)A framework for integrated configuration management tools., and . IM, page 534-540. IEEE, (2013)Security Threat Modeling: Are Data Flow Diagrams Enough?, , , , and . ICSE (Workshops), page 254-257. ACM, (2020)Fine-grained Access-control for the Puppet Configuration Language., , and . LISA, USENIX Association, (2011)MicroVault: Reliable Storage Unit for IoT Devices., , , , and . DCOSS, page 132-140. IEEE, (2020)SCFMSP: static detection of side channels in MSP430 programs., , and . ARES, page 21:1-21:10. ACM, (2020)