Personensuche
X
?
Computer Security. ESORICS 2023 International Workshops; Lecture Notes in Computer Science ,
1
Evaluation of an OPC UA-Based Access Control Enforcement Ar..:
, In:
?
2023 IEEE 20th International Conference on Software Architecture (ICSA) ,
2
Access Control Enforcement Architectures for Dynamic Manufa..:
, In:
?
IECON 2022 – 48th Annual Conference of the IEEE Industrial Electronics Society ,
3
Simulation Environment for Modular Automation Systems:
, In:
?
2022 IEEE Zooming Innovation in Consumer Technologies Conference (ZINC) ,
4
Early Concept Evaluation of a Runtime Monitoring Approach f..:
, In:
?
Proceedings of the 36th Annual ACM Symposium on Applied Computing ,
6
Securing system-of-systems through a game theory approach:
, In:
?
Communications in Computer and Information Science; Software Architecture ,
8
Access Control for Smart Manufacturing Systems:
, In:
?
IECON 2020 The 46th Annual Conference of the IEEE Industrial Electronics Society ,
9
Data-driven Anomaly Detection for Railway Propulsion Contro..:
, In:
?
2020 International Symposium on Industrial Electronics and Applications (INDEL) ,
10
Systematic False Positive Mitigation in Safe Automated Driv..:
, In:
?
2020 IEEE International Conference on Industrial Technology (ICIT) ,
11
Service Realizability Check as a Technique to Support a Ser..:
, In:
?
Formal Methods for Industrial Critical Systems; Lecture Notes in Computer Science ,
12
An Actor-Based Approach for Security Analysis of Cyber-Phys..:
, In:
?
Proceedings of the 14th International Conference on Availability, Reliability and Security ,
13
Applicability of the IEC 62443 standard in Industry 4.0 / I..:
, In:
?
2019 26th Asia-Pacific Software Engineering Conference (APSEC) ,
14
Using Bayesian Networks for a Cyberattacks Propagation Anal..:
, In:
?
2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) ,
15