Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What's in a Deep Model? A Characterization of Knowledge Depth in Intelligent Safety Systems., and . IJCAI, page 559-562. Morgan Kaufmann, (1987)Implementing Situation Awareness for Car-to-X Applications Using Domain Specific Languages., and . VTC Spring, page 1-5. IEEE, (2013)Ada -intelligent space: an artificial creature for the swiss Expo.02., , , , , , , , , and 8 other author(s). ICRA, page 4154-4159. IEEE, (2003)Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions., , , , and . EuroS&P, page 236-250. IEEE, (2022)Accept All Exploits: Exploring the Security Impact of Cookie Banners., , , , and . ACSAC, page 911-922. ACM, (2022)FP-tracer: Fine-grained Browser Fingerprinting Detection via Taint-tracking and Entropy-based Thresholds., , , , , , , , , and . Proc. Priv. Enhancing Technol., 2024 (3): 540-560 (2024)Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting., , , , , and . USENIX Security Symposium, USENIX Association, (2024)Algorithmic Programming Language Identification, , and . CoRR, (2011)Poster: The Risk of Insufficient Isolation of Database Transactions in Web Applications., , , and . CCS, page 3576-3578. ACM, (2023)Large-scale bioenergy production: how to resolve sustainability trade-offs?, , , , , , , , , and 2 other author(s). Environmental Research Letters, 13 (2): 024011 (2018)