Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SDN malware: problems of current protection systems and potential countermeasures.. Sicherheit, volume P-256 of LNI, page 89-100. GI, (2016)SDN Ro2tkits: A Case Study of Subverting A Closed Source SDN Controller.. Sicherheit, volume P-281 of LNI, page 95-106. Gesellschaft für Informatik e.V., (2018)SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks, and . Research in Attacks, Intrusions, and Defenses, Springer, (2015)Malicious Code and Access Control in Software-Defined Networks. 9. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit, page 4. (2014)Multi-layer Access Control for SDN-Based Telco Clouds, , , and . Secure IT Systems, Springer, (2015)Multitouch-Gestensteuerung für das neuartige Suchinterface DelViz., , , and . MuC (Workshopband), page 477-480. Oldenbourg Verlag, (2012)Towards Taming Malicious SDN Applications, and . ESORICS, Wroclaw, Poland, (September 2014)