Search for persons
X
?
Computer Security. ESORICS 2023 International Workshops; Lecture Notes in Computer Science ,
2
On the Use of AutoML for Combating Alert Fatigue in Securit..:
, In:
?
2024 27th Conference on Innovation in Clouds, Internet and Networks (ICIN) ,
3
Towards Intent-Based Scheduling for Performance and Securit..:
, In:
?
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies ,
4
A Self-Sovereign Identity Approach to Decentralized Access ..:
, In:
?
2024 8th Network Traffic Measurement and Analysis Conference (TMA) ,
5
Evaluating the Impact of Design Decisions on Passive DNS-Ba..:
, In:
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
8
A User-Centric Approach to API Delegations: Enforcing Priva..:
, In:
?
Critical Information Infrastructures Security; Lecture Notes in Computer Science ,
9
Threat-Driven Dynamic Security Policies for Cyber-Physical ..:
, In:
?
2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) ,
10
Effective Machine Learning-based Access Control Administrat..:
, In:
?
Proceedings of the 22nd Workshop on Privacy in the Electronic Society ,
11
From Privacy Policies to Privacy Threats: A Case Study in P..:
, In:
?
2023 IEEE 16th International Conference on Cloud Computing (CLOUD) ,
12
Zero-Cost In-Depth Enforcement of Network Policies for Low-..:
, In:
?
Proceedings of the 16th Cyber Security Experimentation and Test Workshop ,
13
Analyzing Cyber Security Research Practices through a Meta-..:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
14
Beware the Doppelgänger: Attacks against Adaptive Threshold..:
, In:
?
2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C) ,
15