Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modular and distributed IDE., , , , , , and . SLE, page 270-282. ACM, (2020)A Collaborative Strategy for Mitigating Tracking through Browser Fingerprinting., , , and . MTD@CCS, page 67-78. ACM, (2019)Donar: Anonymous VoIP over Tor., , , and . NSDI, page 249-265. USENIX Association, (2022)GuaNary: Efficient Buffer Overflow Detection In Virtualized Clouds Using Intel EPT-based Sub-Page Write Protection Support., , , , , , and . SIGMETRICS/Performance (Abstracts), page 65-66. ACM, (2024)Emergent Overlays for Adaptive MANET Broadcast., , , , and . SRDS, page 193-202. IEEE, (2019)Basalt: A Rock-Solid Byzantine-Tolerant Peer Sampling for Very Large Decentralized Networks., , , , and . Middleware, page 111-123. ACM, (2023)Density and Mobility-Driven Evaluation of Broadcast Algorithms for MANETs., , , , and . ICDCS, page 2308-2313. IEEE Computer Society, (2017)Attacks on tomorrow's virtual world., , , , , and . DSN-S, page 105-110. IEEE, (2023)A Model-Driven Approach for Real-time Role-Based Communication., , , and . SBRC, page 630-643. (2020)Odile: A scalable tracing tool for non-rooted and on-device Android phones., , and . RAID, page 252-262. ACM, (2022)