479.575 PEOPLE
People | Locations | Statistics |
---|---|---|
Ziakopoulos, Apostolos | Athens |
|
Vigliani, Alessandro | Turin |
|
Catani, Jacopo | Rome |
|
Statheros, Thomas | Stevenage |
|
Utriainen, Roni | Tampere |
|
Guglieri, Giorgio | Turin |
|
Martínez Sánchez, Joaquín |
| |
Tobolar, Jakub |
| |
Volodarets, M. |
| |
Piwowar, Piotr |
| |
Tennoy, Aud | Oslo |
|
Matos, Ana Rita |
| |
Cicevic, Svetlana |
| |
Sommer, Carsten | Kassel |
|
Liu, Meiqi |
| |
Pirdavani, Ali | Hasselt |
|
Niklaß, Malte |
| |
Lima, Pedro | Braga |
|
Turunen, Anu W. |
| |
Antunes, Carlos Henggeler |
| |
Krasnov, Oleg A. |
| |
Lopes, Joao P. |
| |
Turan, Osman |
| |
Lučanin, Vojkan | Belgrade |
|
Tanaskovic, Jovan |
|
Kounev, Samuel
University of Würzburg
in Cooperation with on an Cooperation-Score of 37%
Topics
- data
- language
- vehicle
- algorithm
- routing
- database
- benchmark
- assessment
- guideline
- survey
- implementation
- submarine
- internet
- security
- developer
- access control
- encyclopedia
- software
- design
- automatic control
- leveling
- student
- software testing
- bracing
- chain
- architecture
- estimating
- cloud
- behavior
- interface
- vision
- transfer function
- protection
- performance evaluation
- migration
- show 5 more
Publications (24/24 displayed)
- 2023Efficient Data Processing: Assessing the Performance of Different Programming Languages
- 2022Tackling the rich vehicle routing problem with nature-inspired algorithmscitations
- 2022Ransomware Detection in Databases through Dynamic Analysis of Query Sequences
- 2022An Experience Report on the Suitability of a Distributed Group Encryption Scheme for an IoT Use Case
- 2022Towards a Cryptography Benchmark: A View on Attribute Based Encryption Schemescitations
- 2022A Survey on Secure Group Communication Schemes With Focus on IoT Communication
- 2021Teaching Software Testing Using Automated Grading
- 2021Performance Impact Analysis of Securing MQTT Using TLS
- 2021Software Testing Strategies for Detecting Hypercall Handlers' Aging-related Bugs
- 2021Measuring the Performance Impact of Branching Instructions
- 2021Towards a Group Encryption Scheme Benchmark: A View on Centralized Schemes with focus on IoT
- 2020Architecture for a Dynamic Security Service Function Chain Reordering Framework
- 2020Heat-aware Load Balancing-Is it a Thing?
- 2020Evaluating the Performance of a State-of-the-Art Group-oriented Encryption Scheme for Dynamic Groups in an IoT Scenario
- 2020Implementing Attack-aware Security Service Function Chain Reordering
- 2019Performance Oriented Dynamic Bypassing for Intrusion Detection Systemscitations
- 2019Online Power Consumption Estimation for Functions in Cloud Applicationscitations
- 2019Hands Off my Database: Ransomware Detection in Databases through Dynamic Analysis of Query Sequences. Techn. Ber. Universität Würzburg
- 2019Towards Testing the Performance Influence of Hypervisor Hypercall Interface Behavior
- 2019Towards Testing the Software Aging Behavior of Hypervisor Hypercall Interfaces
- 2018The Vision of Self-aware Reordering of Security Network Function Chainscitations
- 2018Efficient and Effective Ransomware Detection in Databases
- 2018Addressing Shortcomings of Existing DDoS Protection Software Using SoftwareDefined Networking
- 2018Performance Assessment of Cloud Migrations from Network and Application Point of Viewcitations
Places of action