Author of the publication

Enhanced Security of Building Automation Systems Through Microkernel-Based Controller Platforms.

, , , , , , , , and . ICDCS Workshops, page 37-44. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Uncertainty and Risk Management in Cyber Situational Awareness., , and . Cyber Situational Awareness, volume 46 of Advances in Information Security, Springer, (2010)Effective Network Vulnerability Assessment through Model Abstraction., , and . DIMVA, volume 6739 of Lecture Notes in Computer Science, page 17-34. Springer, (2011)Mission-oriented moving target defense based on cryptographically strong network dynamics., , , and . CSIIRW, page 57. ACM, (2013)Model-driven, Moving-Target Defense for Enterprise Network Security., , , and . Models@run.time@Dagstuhl, volume 8378 of Lecture Notes in Computer Science, page 137-161. Springer, (2011)Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations., , , , , and . SOUPS, page 237-251. USENIX Association, (2016)A Preliminary Study on Using Large Language Models in Software Pentesting., , , , , , , and . CoRR, (2024)MTD 2017: Fourth ACM Workshop on Moving Target Defense (MTD)., and . CCS, page 2637-2638. ACM, (2017)A scalable approach to attack graph generation., , and . CCS, page 336-345. ACM, (2006)An Analysis of the Role of Situated Learning in Starting a Security Culture in a Software Company., , , and . SOUPS @ USENIX Security Symposium, page 617-632. USENIX Association, (2021)Improving Attack Graph Visualization through Data Reduction and Attack Grouping., , , and . VizSEC, volume 5210 of Lecture Notes in Computer Science, page 68-79. Springer, (2008)