Personensuche
X
?
Computer Security. ESORICS 2023 International Workshops; Lecture Notes in Computer Science ,
1
METRICS: A Methodology for Evaluating and Testing the Resil..:
, In:
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
2
Madtls: Fine-grained Middlebox-aware End-to-end Security fo..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
3
When and How to Aggregate Message Authentication Codes on L..:
, In:
?
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) ,
5
Comprehensively Analyzing the Impact of Cyberattacks on Pow..:
, In:
?
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
7
BP-MAC: Fast Authentication for Short Messages:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
8
Poster : INSIDE - Enhancing Network Intrusion Detection ..:
, In:
?
Proceedings of the 15th Workshop on Cyber Security Experimentation and Test ,
9
PowerDuck: A GOOSE Data Set of Cyberattacks in Substations:
, In:
?
?
2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM) ,
11
Improving MAC Protocols for Wireless Industrial Networks vi..:
, In:
?
Proceedings of the 13th International Conference on Availability, Reliability and Security ,
12
Towards In-Network Security for Smart Homes:
, In:
?
Proceedings of the 2017 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation ,
13
Code-transparent Discrete Event Simulation for Time-accurat..:
, In:
?
Industrial Internet of Things; Springer Series in Wireless Technology ,
14
Communication and Networking for the Industrial Internet of..:
, In:
?
Proceedings of the 9th ACM MobiCom workshop on Challenged networks ,
15