Author of the publication

Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process.

, , , , and . ICISSP, page 211-218. SCITEPRESS, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly Detection for Simulated IEC-60870-5-104 Trafiic., , , and . ARES, page 100:1-100:7. ACM, (2017)Malicious Behavior Patterns., , , and . SOSE, page 384-389. IEEE Computer Society, (2014)Ein Werkzeug zum Wissenserwerb., and . ÖGAI, volume 151 of Informatik-Fachberichte, page 82-91. Springer, (1987)A Game Theoretic Analysis of Cyber Threats., , and . ICISSP, page 706-713. SciTePress, (2023)Detection of Man-in-the-Middle Attacks on Industrial Control Networks., , and . ICSSA, page 64-69. IEEE, (2016)Defining Malicious Behavior., , , and . ARES, page 273-278. IEEE Computer Society, (2014)Analytical Modelling of Cyber-physical Systems., and . ICISSP, page 685-689. SciTePress, (2019)Multi-Layer Agent-Based Simulation of Network Behaviour in Advanced Metering Infrastructures., , and . ICS-CSR, BCS, (2015)Advanced File Carving Approaches for Multimedia Files., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2 (4): 42-58 (2011)Informatik für Lehrer -- Studientexte und Handreichungen für den Unterricht, , , , , and . 2 : Komplexere Probleme und Didaktik der Schulinformatik, München, Oldenbourg Verlag, (1982)