Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MOSTO: A toolkit to facilitate security auditing of ICS devices using Modbus/TCP., , , and . Comput. Secur., (September 2023)Model-Based Vulnerability Assessment of Self-Adaptive Protection Systems., and . IDC, volume 616 of Studies in Computational Intelligence, page 439-449. Springer, (2015)Towards a Testbed for Critical Industrial Systems: SunSpec Protocol on DER Systems as a Case Study., , and . ETFA, page 1-4. IEEE, (2022)Quantifying Paging on Recoverable Data from Windows User-Space Modules., and . ICDF2C, volume 441 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1-19. Springer, (2021)Detection of algorithmically generated malicious domain names using masked N-grams., , and . Expert Syst. Appl., (2019)Accurate Performance Estimation for Stochastic Marked Graphs by Bottleneck Regrowing., and . EPEW, volume 6342 of Lecture Notes in Computer Science, page 175-190. Springer, (2010)On Qualitative Analysis of Fault Trees Using Structurally Persistent Nets.. IEEE Trans. Syst. Man Cybern. Syst., 46 (2): 282-293 (2016)Modelling and analysing resilience as a security issue within UML., , and . SERENE, page 42-51. ACM, (2010)Automating Data-Throttling Analysis for Data-Intensive Workflows., , and . CCGRID, page 310-317. IEEE Computer Society, (2012)On Throughput Approximation of Resource-Allocation Systems by Bottleneck Regrowing., and . IEEE Trans. Contr. Sys. Techn., 27 (1): 370-377 (2019)