Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Service Dependencies in Information Systems Security., , , and . MMM-ACNS, volume 6258 of Lecture Notes in Computer Science, page 1-20. Springer, (2010)Internet of Things: A Definition & Taxonomy., , , , and . NGMAST, page 72-77. IEEE, (2015)A Service Dependency Model for Cost-Sensitive Intrusion Response., , , and . ESORICS, volume 6345 of Lecture Notes in Computer Science, page 626-642. Springer, (2010)Demo Paper: Caught in my Radio Net - Experiment with Honeypots in Radio Access Networks., , and . ICIN, page 1-3. IEEE, (2022)Mentor: Positive DNS Reputation to Skim-Off Benign Domains in Botnet C&C Blacklists., , , and . SEC, volume 428 of IFIP Advances in Information and Communication Technology, page 1-14. Springer, (2014)Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment., , , and . SEC, volume 330 of IFIP Advances in Information and Communication Technology, page 148-160. Springer, (2010)Analyzing HTTP User Agent Anomalies for Malware Detection.. DPM/SETOP, volume 7731 of Lecture Notes in Computer Science, page 187-200. Springer, (2012)Assessing the risk of complex ICT systems., , , , and . Ann. des Télécommunications, 73 (1-2): 95-109 (2018)A New Threat Assessment Method for Integrating an IoT Infrastructure in an Information System., , , , and . ICDCS Workshops, page 105-112. IEEE Computer Society, (2017)A new approach to investigate IoT threats based on a four layer model., , , , and . NOTERE, page 1-6. IEEE, (2016)