Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding security requirements for industrial control system supply chains., , and . SEsCPS@ICSE, page 50-53. IEEE / ACM, (2019)Automatically Dismantling Online Dating Fraud., , , , , and . CoRR, (2019)Buddy's Wearable Is Not Your Buddy: Privacy Implications of Pet Wearables., , , , and . IEEE Secur. Priv., 17 (3): 28-39 (2019)Automating the mutation testing of aspect-oriented Java programs., , , and . AST, page 51-58. ACM, (2010)CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy., and . ACM Conference on Computer and Communications Security, page 2171-2172. ACM, (2018)On the Impact of Evolving Requirements-Architecture Dependencies: An Exploratory Study., , , and . CAiSE, volume 5074 of Lecture Notes in Computer Science, page 243-257. Springer, (2008)Who Am I? Analyzing Digital Personas in Cybercrime Investigations., , , , , and . Computer, 46 (4): 54-61 (2013)Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds., , , and . CPS-SPC@CCS, page 75-86. ACM, (2019)Tokyo, Denver, Helsinki, Lisbon or the Professor? A Framework for Understanding Cybercriminal Roles in Darknet Markets., , and . eCrime, page 1-12. IEEE, (2021)Why Rigorous Underpinnings for Cyber Security Education and Training Matter? Experiences from CyBOK: The Cyber Security Body of Knowledge.. ICISSP, page 5. SCITEPRESS, (2022)