Author of the publication

Usable Security Model for Industrial Control Systems - Authentication and Authorisation Workflow.

, , and . EuroUSEC, page 205-217. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe, , , , , , , and . Computer, 43 (2): 19-26 (2010)Object Database Evolution Using Separation of Concerns., and . SIGMOD Record, 29 (4): 26-33 (2000)Detecting broken pointcuts using structural commonality and degree of interest., , , and . Sci. Comput. Program., (2017)Interventions for software security: creating a lightweight program of assurance techniques for developers., , , , , and . ICSE (SEIP), page 41-50. IEEE / ACM, (2019)Facilitating Virtual Representation of CAD Data Through A Learning Based Approach to Conceptual Database Evolution Employing Direct Instance Sharing., and . DEXA, volume 1460 of Lecture Notes in Computer Science, page 384-393. Springer, (1998)Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy., , and . Proc. Priv. Enhancing Technol., 2019 (2): 209-227 (2019)Technical Report: Gone in 20 Seconds - Overview of a Password Vulnerability in Siemens HMIs., and . CoRR, (2020)Basic Cyber Hygiene: Does It Work?, , , , and . Computer, 52 (4): 21-31 (2019)Everything Is Awesome! or Is It? Cyber Security Risks in Critical Infrastructure., , , and . CRITIS, volume 11777 of Lecture Notes in Computer Science, page 3-17. Springer, (2019)Towards a taxonomy of software change: Research Articles, , , , and . J. Softw. Maint. Evol., 17 (5): 309--332 (2005)