Author of the publication

Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection.

, , , and . J. Internet Serv. Inf. Secur., 4 (4): 127-137 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Michael Beltle University of Stuttgart

Measurement System for Surface Potentials in Realistic HVDC-GIS Environments, , , and . 23rd International Symposium on High Voltage Engineering (ISH 2023), page 543-547. Stevenage, Institution of Engineering and Technology, (2023)
Measurement System for Surface Potentials in Realistic HVDC-GIS Environments, , , and . 23rd International Symposium on High Voltage Engineering (ISH 2023), page 543-547. Stevenage, Institution of Engineering and Technology, (2023)Measurement and Simulation of the Shielding Effectiveness of Planar Material with Apertures using a ASTM D4935 TEM Cell, , and . 2023 International Symposium on Electromagnetic Compatibility : EMC Europe, IEEE, (2023)Using capacitive electric field sensors to measure transient overvoltages : a case study, , , , and . 23rd International Symposium on High Voltage Engineering (ISH 2023), page 20-25. Stevenage, Institution of Engineering and Technology, (2023)
 

Other publications of authors with the same name

Refinement checking for privacy policies., , and . Sci. Comput. Program., 77 (10-11): 1198-1209 (2012)Challenges to Process-Algebraic Property-Checking.. PDPTA, page 273-278. CSREA Press, (1999)Insider Attacks in Cloud Computing., , and . TrustCom, page 857-862. IEEE Computer Society, (2012)A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate., , , , and . J. Cybersecurity, 4 (1): tyy006 (2018)Critical Systems Validation and Verification with CSP and FDR., and . FM-Trends, volume 1641 of Lecture Notes in Computer Science, page 243-250. Springer, (1998)Programming in occam 2., and . Prentice Hall international series in computer science Prentice Hall, (1985)Predicting Graphical Passwords., , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 23-35. Springer, (2015)Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement., , , and . CoRR, (2019)Analysis of Dependencies in Critical Infrastructures., , and . CRITIS, volume 6983 of Lecture Notes in Computer Science, page 18-29. Springer, (2011)A Modelling Approach for Interdependency in Digital Systems-of-Systems Security - Extended Abstract., , , and . CRITIS, volume 6712 of Lecture Notes in Computer Science, page 153-156. Springer, (2010)