Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Quality Challenges and Future Research Directions in Threat Intelligence Sharing Practice., , , and . WISCS@CCS, page 65-70. ACM, (2016)An analysis and classification of public information security data sources used in research and practice., , , and . Comput. Secur., (2019)Applying Security Testing Techniques to Automotive Engineering., , and . CoRR, (2023)Applying Security Testing Techniques to Automotive Engineering., , and . ARES, page 61:1-61:10. ACM, (2019)Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives., , , and . Wirtschaftsinformatik, (2017)A taxonomy of attack mechanisms in the automotive domain., , , and . Comput. Stand. Interfaces, (2021)A Maturity Model for Digital Business Ecosystems from an IT Perspective., , and . J. Univers. Comput. Sci., 29 (1): 34-72 (January 2023)Integrating Shared Cyber Security Information into Information Security Risk Management.. CAiSE (Doctoral Consortium), volume 1603 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)Collecting and Integrating Unstructured Information into Enterprise Architecture Management: A Systematic Literature Review., , and . ICEIS (2), page 728-737. SCITEPRESS, (2020)A success model for cyber threat intelligence management platforms., , and . Comput. Secur., (2021)