Author of the publication

Security Challenges of Reconfigurable Devices in the Power Grid.

, , and . Critical Infrastructure Protection, volume 253 of IFIP, page 147-160. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The evolution of storage service providers: techniques and challenges to outsourcing storage., , and . StorageSS, page 1-8. ACM, (2005)CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code, , , and . IEEE Transactions on Software Engineering, 32 (3): 176--192 (March 2006)Security Challenges of Reconfigurable Devices in the Power Grid., , and . Critical Infrastructure Protection, volume 253 of IFIP, page 147-160. Springer, (2007)CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code., , , and . OSDI, page 289-302. USENIX Association, (2004)Secure Configuration for Software Defined Radio. University of Illinois Urbana-Champaign, USA, (2008)Toward a threat model for storage systems., , , and . StorageSS, page 94-102. ACM, (2005)Why Johnny Can Hack: The Mismatch between Vulnerabilities and Security Protection Standards., and . ISSSE, (2006)Threat modeling as a basis for security requirements, , and . Symposium on requirements engineering for information security (SREIS), 2005, page 1--8. (2005)Relescope: an experiment in accelerating relationships., , and . CHI Extended Abstracts, page 1363-1366. ACM, (2005)