Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Improved Understanding and Holistic Management of the Cyber Security Challenges in Power Transmission Systems., , , and . CD-ARES, volume 8127 of Lecture Notes in Computer Science, page 240-255. Springer, (2013)Tackling the Cloud Forensic Problem While Keeping Your Eye on the GDPR., and . CloudCom, page 418-423. IEEE, (2019)Current practices and challenges in industrial control organizations regarding information security incident management - Does size matter? Information security incident management in large and small industrial control organizations., , and . Int. J. Crit. Infrastructure Prot., (2016)5G as an Enabler for Secure IoT in the Smart Grid : Invited Paper., and . SA, page 1-7. IEEE, (2019)Putting the Äccount" into Cloud Accountability.. CLOSER, page 9-18. SciTePress, (2019)The Security Intention Meeting Series as a way to increase visibility of software security decisions in agile development projects., , , and . ARES, page 59:1-59:8. ACM, (2019)GPRS Security for Smart Meters., , and . CD-ARES, volume 8127 of Lecture Notes in Computer Science, page 195-207. Springer, (2013)Security Incident Information Exchange for Cloud Services., , , and . IoTBD, page 391-398. SciTePress, (2016)Improving smart grid security through 5G enabled IoT and edge computing., , , and . Concurr. Comput. Pract. Exp., (2021)A Secure MANET Routing Protocol for Crisis Situations., , and . Int. J. Syst. Softw. Secur. Prot., 9 (4): 17-45 (2018)