Author of the publication

An Open and Flexible CyberSecurity Training Laboratory in IT/OT Infrastructures.

, , and . IOSec/MSTEC/FINSEC@ESORICS, volume 11981 of Lecture Notes in Computer Science, page 140-155. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Pull Printing with QR Codes and National eID Cards: A Software-oriented Design and an Open-source Implementation., , , and . CODASPY, page 251-256. ACM, (2021)An Open and Flexible CyberSecurity Training Laboratory in IT/OT Infrastructures., , and . IOSec/MSTEC/FINSEC@ESORICS, volume 11981 of Lecture Notes in Computer Science, page 140-155. Springer, (2019)End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies., , , and . DBSec, volume 13383 of Lecture Notes in Computer Science, page 236-255. Springer, (2022)DoS Attacks in Available MQTT Implementations: Investigating the Impact on Brokers and Devices, and supported Anti-DoS Protections., , , and . ARES, page 82:1-82:9. ACM, (2021)Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations., , , , and . STM, volume 11738 of Lecture Notes in Computer Science, page 19-35. Springer, (2019)Assisted Authoring, Analysis and Enforcement of Access Control Policies in the Cloud., and . SEC, volume 502 of IFIP Advances in Information and Communication Technology, page 296-309. Springer, (2017)Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system., , , and . Int. J. Inf. Sec., 21 (2): 379-408 (2022)Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness., , and . ARES, page 86:1-86:10. ACM, (2022)Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem., , and . SACMAT, page 213-220. ACM, (2020)MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers., , , , and . SERVICES, page 47-53. IEEE, (2019)