Author of the publication

A Malware-Tolerant, Self-Healing Industrial Control System Framework.

, , and . SEC, volume 502 of IFIP Advances in Information and Communication Technology, page 46-60. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

In AI We Trust: Ethics, Artificial Intelligence, and Reliability.. Sci. Eng. Ethics, 26 (5): 2749-2767 (2020)Artificial intelligence ethics guidelines for developers and users: clarifying their content and normative implications., and . J. Inf. Commun. Ethics Soc., 19 (1): 61-86 (2021)Automatic verification of transparency protocols., , and . EuroS&P, page 107-121. IEEE, (2023)Untraceability in the applied pi-calculus., , , and . ICITST, page 1-6. IEEE, (2009)Software Package Requirements and Procurement., , and . IWSSD, page 141-145. IEEE Computer Society, (1996)Towards a Verified Reference Implementation of a Trusted Platform Module., , and . Security Protocols Workshop, volume 7028 of Lecture Notes in Computer Science, page 69-81. Springer, (2009)Approximating ATL* in ATL., , and . VMCAI, volume 2294 of Lecture Notes in Computer Science, page 289-301. Springer, (2002)Privacy Supporting Cloud Computing: ConfiChair, a Case Study., , and . POST, volume 7215 of Lecture Notes in Computer Science, page 89-108. Springer, (2012)A Trusted Infrastructure for P2P-based Marketplaces., , and . Peer-to-Peer Computing, page 151-154. IEEE, (2009)Mixed-Depth Representations of Natural Language Text, and . Text-Based Intelligent Systems: Current research and practice in information extraction and retrieval, Lawrence Erlbaum, Hillsdale (New Jersey), Hove and London, (1992)