Search for persons
X
?
2023 IFIP Networking Conference (IFIP Networking) ,
1
Learning to Walk: Towards Assessing the Maturity of OT Secu..:
, In:
?
2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) ,
2
To me, to you: Towards Secure PLC Programming through a Com..:
, In:
?
Lecture Notes in Computer Science; Medical Optical Imaging and Virtual Microscopy Image Analysis ,
3
A Light-Weight Interpretable Model for Nuclei Detection and..:
, In:
?
Cellular, Molecular, Physiological, and Behavioral Aspects of Traumatic Brain Injury ,
4
Contributors:
, In:
?
Cellular, Molecular, Physiological, and Behavioral Aspects of Traumatic Brain Injury ,
5
Neuroendocrine abnormalities following traumatic brain inju..:
, In:
?
Postdigital Science and Education; The Epistemology of Deceit in a Postdigital Era ,
6
US Digital Nationalism: A Habermasian Critical Discourse An..:
, In:
?
Computer Security; Lecture Notes in Computer Science ,
7
Extended Abstract - Transformers: Intrusion Detection Data ..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
8
Fast and Furious: Outrunning Windows Kernel Notification Ro..:
, In:
?
Living in the Internet of Things (IoT 2019) ,
9
The forgotten I in IIoT: A vulnerability scanner for indust..:
, In:
?
Critical Information Infrastructures Security; Lecture Notes in Computer Science ,
10
Everything Is Awesome! or Is It? Cyber Security Risks in Cr..:
, In:
?
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy ,
11
Oops I Did it Again : Further Adventures in the Land of ..:
, In:
?
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy ,
12
"How Long is a Piece of String": : Defining Key Phases a..:
, In:
?
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy ,
13
On the Significance of Process Comprehension for Conducting..:
, In:
?
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy ,
14
Achieving ICS Resilience and Security through Granular Data..:
, In:
?
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy ,
15