Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cyber Threat Intelligence Management Platform for Industrial Environments., , , , and . CoRR, (2023)Introducing responsibly self-healing into the incident management lifecycle., , and . PETRA, page 335-337. ACM, (2023)Cyber-pi: Intelligent cyberthreat detection and supervised response., , and . RCIS (Research Projects), volume 3601 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology., , , , , and . SecITC, volume 11359 of Lecture Notes in Computer Science, page 300-313. Springer, (2018)A Blockchain-Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem., , , , , and . Secur. Commun. Networks, (2019)An Innovative Self-Healing Approach with STIX Data Utilisation., , , and . ICETE (2), page 645-651. ScitePress, (2020)An autoML network traffic analyzer for cyber threat detection., , , , and . Int. J. Inf. Sec., 22 (5): 1511-1530 (October 2023)Adapting Econometric Models, Technical Analysis and Correlation Data to Computer Security Data., , , and . SysSec@DIMVA, page 59-62. IEEE, (2011)A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources., , , , , , and . ARES, page 83:1-83:10. ACM, (2019)Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem., , , , , and . Computers, 9 (1): 18 (2020)