380.256 PEOPLE
People | Locations | Statistics |
---|---|---|
Seuring, Stefan |
| |
Nor Azizi, S. |
| |
Pato, Margarida Vaz |
| |
Kölker, Katrin |
| |
Huber, Oliver |
| |
Király, Tamás |
| |
Spengler, Thomas Stefan |
| |
Al-Ammar, Essam A. |
| |
Dargahi, Fatemeh |
| |
Mota, Rui |
| |
Mazalan, Nurul Aliah Amirah |
| |
Macharis, Cathy | Brussels |
|
Arunasari, Yova Tri |
| |
Nunez, Alfredo | Delft |
|
Bouhorma, Mohammed |
| |
Bonato, Matteo |
| |
Fitriani, Ira |
| |
Autor Correspondente Coelho, Sílvia. |
| |
Pond, Stephen |
| |
Okwara, Ukoha Kalu |
| |
Toufigh, Vahid |
| |
Campisi, Tiziana | Enna |
|
Ermolieva, Tatiana |
| |
Sánchez-Cambronero, Santos |
| |
Agzamov, Akhror |
|
Kounev, Samuel
in Cooperation with on an Cooperation-Score of 37%
Topics
Publications (18/18 displayed)
- 2024Attack-Aware Security Function Chaining
- 2023Efficient Data Processing: Assessing the Performance of Different Programming Languagescitations
- 2022Ransomware Detection in Databases through Dynamic Analysis of Query Sequences
- 2022A Survey on Secure Group Communication Schemes With Focus on IoT Communicationcitations
- 2022An Experience Report on the Suitability of a Distributed Group Encryption Scheme for an IoT Use Casecitations
- 2022Towards a Cryptography Benchmark: A View on Attribute Based Encryption Schemescitations
- 2021Measuring the Performance Impact of Branching Instructions
- 2021Performance Impact Analysis of Securing MQTT Using TLS
- 2021Towards a Group Encryption Scheme Benchmark: A View on Centralized Schemes with focus on IoT
- 2021Teaching Software Testing Using Automated Grading
- 2021Software Testing Strategies for Detecting Hypercall Handlers' Aging-related Bugs
- 2020Heat-aware Load Balancing-Is it a Thing?
- 2020Architecture for a Dynamic Security Service Function Chain Reordering Framework
- 2020Implementing Attack-aware Security Service Function Chain Reordering
- 2019Online Power Consumption Estimation for Functions in Cloud Applicationscitations
- 2019Performance Oriented Dynamic Bypassing for Intrusion Detection Systemscitations
- 2018Addressing Shortcomings of Existing DDoS Protection Software Using SoftwareDefined Networking
- 2018Performance Assessment of Cloud Migrations from Network and Application Point of Viewcitations
Places of action
Organizations | Location | People |
---|