Search for persons
X
?
Computer Security. ESORICS 2023 International Workshops; Lecture Notes in Computer Science ,
1
METRICS: A Methodology for Evaluating and Testing the Resil..:
, In:
?
NOMS 2024-2024 IEEE Network Operations and Management Symposium ,
2
Unconsidered Installations: Discovering IoT Deployments in ..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
3
When and How to Aggregate Message Authentication Codes on L..:
, In:
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
4
One IDS Is Not Enough! Exploring Ensemble Learning for Indu..:
, In:
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
5
Towards Secure 5G Infrastructures for Production Systems:
, In:
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
6
Madtls: Fine-grained Middlebox-aware End-to-end Security fo..:
, In:
?
Internet of Production; Interdisciplinary Excellence Accelerator Series ,
7
Evolving the Digital Industrial Infrastructure for Producti..:
, In:
?
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) ,
8
Comprehensively Analyzing the Impact of Cyberattacks on Pow..:
, In:
?
Advances in Information Security; Blockchains ,
9
Illicit Blockchain Content: Its Different Shapes, Consequen..:
, In:
?
2023 International Conference on Smart Energy Systems and Technologies (SEST) ,
10
Investigation of Multi-Stage Attack and Defense Simulation ..:
, In:
?
Advanced Information Systems Engineering; Lecture Notes in Computer Science ,
11
Designing Secure and Privacy-Preserving Information Systems..:
, In:
?
2023 IEEE PES Innovative Smart Grid Technologies Europe (ISGT EUROPE) ,
12
Benchmark Evaluation of Anomaly-Based Intrusion Detection S..:
, In:
?
2023 IEEE Belgrade PowerTech ,
13