Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital Twins for Cyber-Physical Threat Detection and Response., , and . ERCIM News, 2021 (126): 0 (2021)Securing Cyber-Physical Systems through Digital Twins., and . ERCIM News, (2018)Ontological Mapping of Common Criteria's Security Assurance Requirements., , , and . SEC, volume 232 of IFIP, page 85-95. Springer, (2007)Securing the testing process for industrial automation software., , , and . Comput. Secur., (2019)Formalizing information security knowledge., and . AsiaCCS, page 183-194. ACM, (2009)Anonymisation of Heterogeneous Graphs with Multiple Edge Types., , and . DEXA (1), volume 13426 of Lecture Notes in Computer Science, page 130-135. Springer, (2022)An Efficient Approach for Anonymising the Structure of Heterogeneous Graphs., , and . IEEE Big Data, page 5783-5791. IEEE, (2022)An evaluation of technologies for the pseudonymization of medical data., and . SAC, page 857-858. ACM, (2009)Interactive Selection of ISO 27001 Controls under Multiple Objectives., , and . SEC, volume 278 of IFIP, page 477-492. Springer, (2008)VloGraph: A Virtual Knowledge Graph Framework for Distributed Security Log Analysis., , , , , and . Mach. Learn. Knowl. Extr., 4 (2): 371-396 (2022)