Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

S3A: Secure System Simplex Architecture for Enhanced Security of Cyber-Physical Systems, , , , , and . CoRR, (2012)A Novel Scheduling Framework Leveraging Hardware Cache Partitioning for Cache-Side-Channel Elimination in Clouds., , , , , and . CoRR, (2017)SchedGuard: Protecting against Schedule Leaks Using Linux Containers., , , , , , , , and . RTAS, page 14-26. IEEE, (2021)Guaranteed physical security with restart-based design for cyber-physical systems., , , , , and . ICCPS, page 10-21. IEEE Computer Society / ACM, (2018)Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs., , , , , , , , and . MILCOM, page 1065-1069. IEEE, (2022)Towards Automated Safety Vetting of PLC Code in Real-World Plants., , , , , , , , , and 1 other author(s). IEEE Symposium on Security and Privacy, page 522-538. IEEE, (2019)On-chip control flow integrity check for real time embedded systems., , , , , , , and . CPSNA, page 26-31. IEEE Computer Society, (2013)Set the Configuration for the Heart of the OS: On the Practicality of Operating System Kernel Debloating., , , and . SIGMETRICS (Abstracts), page 87-88. ACM, (2020)Memory heat map: anomaly detection in real-time embedded systems using memory behavior., , , and . DAC, page 35:1-35:6. ACM, (2015)SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems., , , , and . IEEE Real-Time and Embedded Technology and Applications Symposium, page 21-32. IEEE Computer Society, (2013)