Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formulaic composition in the blues: A view from the field., and . JOURNAL OF AMERICAN FOLKLORE, 120 (478): 482--499 (2007)120; 120.Wireless ATM LAN with and without infrastructure., , , , and . IEEE Commun. Mag., 36 (4): 90-95 (1998)Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations., , and . ICGS3, volume 534 of Communications in Computer and Information Science, page 83-95. Springer, (2015)Automated black-box detection of side-channel vulnerabilities in web applications., and . ACM Conference on Computer and Communications Security, page 263-274. ACM, (2011)Flexible Policy directed code safety, and . Proceedings of the 1999 IEEE conference on Security and Privacy, (1999)Secure aggregation for wireless networks, and . Workshop on Security and Assurance in Ad hoc Networks, (2003)On Staleness and the Delivery of Web Pages., , and . Inf. Syst. Frontiers, 5 (2): 129-136 (2003)End-to-end security assessment framework for connected vehicles., , , , and . WPMC, page 1-6. IEEE, (2019)An Attack-Resilient Architecture for the Internet of Things., , and . IEEE Trans. Inf. Forensics Secur., (2020)Protecting Private Web Content from Embedded Scripts., and . ESORICS, volume 6879 of Lecture Notes in Computer Science, page 60-79. Springer, (2011)