Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications., , , , , , and . AAMAS, page 178-186. ACM, (2017)An Investigation of Large Language Models for Real-World Hate Speech Detection., , , , , , and . ICMLA, page 1568-1573. IEEE, (2023)Discovering and Using Patterns for Countering Security Challenges.. Arizona State University, Tempe, USA, (2014)base-search.net (ftarizonastateun:item:26801).EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices., , , , , and . CCS, page 2931-2945. ACM, (2022)On the Safety and Efficiency of Virtual Firewall Elasticity Control., , , , , , and . NDSS, The Internet Society, (2017)Understanding and Detecting Remote Infection on Linux-based IoT Devices., , , , , , and . AsiaCCS, page 873-887. ACM, (2022)ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems., , , and . MSCPES@CPSIoTWeek, page 1-6. IEEE, (2019)Toward Discovering and Exploiting Private Server-Side Web APIs., , , , and . ICWS, page 420-427. IEEE Computer Society, (2016)SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam., , , and . IEEE Symposium on Security and Privacy, page 320-338. IEEE Computer Society, (2016)Challenges and Preparedness of SDN-based Firewalls., , , , , and . SDN-NFV@CODASPY, page 33-38. ACM, (2018)