Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructing Spatial Narratives: Considerations and Practices Across Communities., , , , , , , and . DH, (2020)Virtual Harlem.. SIGGRAPH Abstracts and Applications, page 103-104. ACM, (1999)Virtual Heritage at iGrid 2000, , , , , and . Proceedings of INET 2001, Stockholm, Sweden, (June 2001)Virtual Heritage at iGrid 2000., , , , , and . CoRR, (2023)Cyber-Physical Security Through Resiliency: A Systems-centric Approach., , , , , , and . CoRR, (2020)A model-based approach to security analysis for cyber-physical systems., , , and . SysCon, page 1-8. IEEE, (2018)Selecting System Specific Cybersecurity Attack Patterns Using Topic Modeling., , , and . TrustCom/BigDataSE, page 490-497. IEEE, (2018)A systems approach for eliciting mission-centric security requirements., , , and . SysCon, page 1-8. IEEE, (2018)A Preliminary Design-Phase Security Methodology for Cyber-Physical Systems., , , , , , and . Syst., 7 (2): 21 (2019)A Systems Approach for Eliciting Mission-Centric Security Requirements., , , and . CoRR, (2017)