Personensuche
X
?
Lecture Notes in Computer Science; Embedded Computer Systems: Architectures, Modeling, and Simulation ,
2
Hard Edges: Hardware-Based Control-Flow Integrity for Embed..:
, In:
?
2022 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW) ,
3
The Best of Many Worlds: Scheduling Machine Learning Infere..:
, In:
?
Proceedings of the 13th Symposium on Cloud Computing ,
4
Arax : a runtime framework for decoupling applications f..:
, In:
?
Technologies and Applications for Big Data Value ,
5
Big Data Analytics in the Manufacturing Sector: Guidelines ..:
, In:
?
Technologies and Applications for Big Data Value ,
6
Big Data Analytics in the Banking Sector: Guidelines and Le..:
, In:
?
Cybersecurity Issues in Emerging Technologies ,
10
The Evolution of Hardware-Assisted Security:
, In:
?
Lecture Notes in Computer Science; Information Security ,
11
Andromeda: Enabling Secure Enclaves for the Android Ecosyst..:
, In:
?
Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy ,
12
TrustAV : Practical and Privacy Preserving Malware Analy..:
, In:
?
2020 IEEE 13th International Conference on Cloud Computing (CLOUD) ,
14
The Million Dollar Handshake: Secure and Attested Communica..:
, In:
?
2020 6th IEEE Conference on Network Softwarization (NetSoft) ,
15