Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ontological Mapping of Common Criteria's Security Assurance Requirements., , , and . SEC, volume 232 of IFIP, page 85-95. Springer, (2007)Securing Cyber-Physical Systems through Digital Twins., and . ERCIM News, (2018)Digital Twins for Cyber-Physical Threat Detection and Response., , and . ERCIM News, 2021 (126): 0 (2021)Securing the testing process for industrial automation software., , , and . Comput. Secur., (2019)Anonymisation of Heterogeneous Graphs with Multiple Edge Types., , and . DEXA (1), volume 13426 of Lecture Notes in Computer Science, page 130-135. Springer, (2022)Formalizing information security knowledge., and . AsiaCCS, page 183-194. ACM, (2009)An Efficient Approach for Anonymising the Structure of Heterogeneous Graphs., , and . IEEE Big Data, page 5783-5791. IEEE, (2022)Security aspects in Semantic Web Services Filtering., , , , , , and . iiWAS, volume 229 of books@ocg.at, page 21-31. Austrian Computer Society, (2007)A Versatile Security Layer for AutomationML., , and . INDIN, page 358-364. IEEE, (2019)Combining Machine Learning and Semantic Web: A Systematic Mapping Study., , , , , , , , , and 1 other author(s). NeSy, volume 3432 of CEUR Workshop Proceedings, page 424. CEUR-WS.org, (2023)