Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks., , , , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 524-529. Springer, (2014)Software-Defined LANs for Interconnected Smart Environment., , , , , , , , , and . ITC, page 219-227. IEEE, (2015)Towards Dynamic Risk Management: Success Likelihood of Ongoing Attacks., , , , and . Bell Labs Tech. J., 17 (3): 61-78 (2012)Elementary Risks: Bridging Operational and Strategic Security Realms., , and . SITIS, page 278-286. IEEE Computer Society, (2015)Better Safe than Sorry: Modeling Reliability and Security in Replicated SDN Controllers., , , and . DRCN, page 1-6. IEEE, (2020)Secure Application-Oriented Network Micro-Slicing., , , , and . NetSoft, page 248-250. IEEE, (2019)Dynamic risk management response system to handle cyber threats., , , , , , , and . Future Gener. Comput. Syst., (2018)On the Fly Design and Co-simulation of Responses Against Simultaneous Attacks., , , , , and . ESORICS (2), volume 9327 of Lecture Notes in Computer Science, page 642-661. Springer, (2015)STewARD: SDN and blockchain-based Trust evaluation for Automated Risk management on IoT Devices., , , , and . INFOCOM Workshops, page 841-846. IEEE, (2019)Detecting Fake Base Stations Using Knowledge Graphs and ML-Based Techniques., , , , and . VCC, page 37-42. IEEE, (2023)