Search for persons
X
?
NOMS 2024-2024 IEEE Network Operations and Management Symposium ,
1
SDN-based Mitigation of Synchronization Attacks on Distribu..:
, In:
?
NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium ,
3
Auto-tuning of Hyper-parameters for Detecting Network Intru..:
, In:
?
NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium ,
5
Detecting Multi-Step Attacks: A Modular Approach for Progra..:
, In:
?
2020 IEEE Conference on Industrial Cyberphysical Systems (ICPS) ,
7
Detecting a Stealthy Attack in Distributed Control for Micr..:
, In:
?
Distributed Applications and Interoperable Systems; Lecture Notes in Computer Science ,
8
Capturing Privacy-Preserving User Contexts with IndoorHash:
, In:
?
NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium ,
9
A Process Mining Tool for Supporting IoT Security:
, In:
?
NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium ,
10
A Process Mining Approach for Supporting IoT Predictive Sec..:
, In:
?
Proceedings of the 6th International Conference on Mobile Software Engineering and Systems ,
11
Testing nearby peer-to-peer mobile apps at large:
, In:
?
2019 IEEE/ACM 6th International Conference on Mobile Software Engineering and Systems (MOBILESoft) ,
12
Testing Nearby Peer-to-Peer Mobile Apps at Large:
, In:
?
Distributed Applications and Interoperable Systems; Lecture Notes in Computer Science ,
13
FOUGERE: User-Centric Location Privacy in Mobile Crowdsourc..:
, In:
?
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering ,
14