Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks., , and . CoRR, (2017)Reasoning on Adopting OPC UA for an IoT-Enhanced Smart Energy System from a Security Perspective.. CBI (2), page 140-143. IEEE Computer Society, (2018)978-1-5386-7016-3.Towards a Secure Smart Grid Storage Communications Gateway., and . CoRR, (2017)Smart Ticket Protection: An Architecture for Cyber-Protecting Physical Tickets Using Digitally Signed Random Pattern Markers.. CBI (2), page 110-113. IEEE Computer Society, (2018)978-1-5386-7016-3.An Overview of Wireless IoT Protocol Security in the Smart Home Domain., , , and . CoRR, (2018)On the Resilience of a QKD Key Synchronization Protocol for IPsec., , and . CoRR, (2018)Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing., , and . CECC, page 25:1-25:3. ACM, (2019)Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing., , , and . ARES, page 102:1-102:8. ACM, (2019)Decentralized Energy Networks Based on Blockchain: Background, Overview and Concept Discussion., , , , , , , , and . BIS (Workshops), volume 339 of Lecture Notes in Business Information Processing, page 244-257. Springer, (2018)An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks., , and . SafeConfig@CCS, page 37-43. ACM, (2016)