Author of the publication

The Development of Dependable and Survivable Grids.

, , , , , , and . International Conference on Computational Science (2), volume 3515 of Lecture Notes in Computer Science, page 729-737. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

N-variant systems: a secretless framework for security through diversity, , , , , , , , and . Proceedings of the 15th conference on USENIX Security Symposium - Volume 15, Berkeley, CA, USA, USENIX Association, (2006)Online control adaptation for safe and secure autonomous vehicle operations., , , , , , and . AHS, page 101-108. IEEE, (2017)Effectiveness of Moving Target Defenses., , and . Moving Target Defense, volume 54 of Advances in Information Security, Springer, (2011)Secure and practical defense against code-injection attacks using software dynamic translation., , , , , , , , and . VEE, page 2-12. ACM, (2006)Security through redundant data diversity., , , , and . DSN, page 187-196. IEEE Computer Society, (2008)START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report)., , , , , , , , , and 3 other author(s). ISSRE, page 73-84. IEEE, (2022)The Development of Dependable and Survivable Grids., , , , , , and . International Conference on Computational Science (2), volume 3515 of Lecture Notes in Computer Science, page 729-737. Springer, (2005)Zipr++: Exceptional Binary Rewriting., , , , , and . FEAST@CCS, page 9-15. ACM, (2017)Diversity in Cybersecurity., , , , and . Computer, 49 (4): 94-98 (2016)Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections., , , , , , , , and . HPCC, volume 4782 of Lecture Notes in Computer Science, page 260-272. Springer, (2007)