Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Artificial Intelligence for next generation cybersecurity: The AI4CYBER framework., , , and . ARES, page 133:1-133:8. ACM, (2023)The DYNABIC approach to resilience of critical infrastructures., , , , , , , , , and 2 other author(s). ARES, page 136:1-136:8. ACM, (2023)VITALAS at TRECVID-2009., , , , , , , , , and 19 other author(s). TRECVID, National Institute of Standards and Technology (NIST), (2009)Development and Operation of Trustworthy Smart IoT Systems: The ENACT Framework., , , , , , , , , and 8 other author(s). DEVOPS, volume 12055 of Lecture Notes in Computer Science, page 121-138. Springer, (2019)Towards Smarter Security Orchestration and Automatic Response for CPS and IoT., , , , , , , , , and 2 other author(s). CloudCom, page 298-302. IEEE, (2023)Towards the adoption of automated cyber threat intelligence information sharing with integrated risk assessment., , , and . ARES, page 166:1-166:9. ACM, (2024)Continuous Quantitative Risk Management in Smart Grids Using Attack Defense Trees., , , , and . Sensors, 20 (16): 4404 (2020)MUSA Deployer: Deployment of Multi-cloud Applications., , , , , , and . WETICE, page 107-112. IEEE Computer Society, (2017)