Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Autonomous Space Resupply Vehicle Systems Security Design Principle Case Study., and . CNS, page 1-8. IEEE, (2020)A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System., , , and . SysCon, page 1-7. IEEE, (2019)Examination of security design principles from NIST SP 800-160., , and . SysCon, page 1-8. IEEE, (2018)Performance Evaluations of Quantum Key Distribution System Architectures., , , , and . IEEE Secur. Priv., 13 (1): 30-40 (2015)Post-Quantum Cryptography: What Advancements in Quantum Computing Mean for IT Professionals., , , and . IT Prof., 18 (5): 42-47 (2016)Considerations for Cyber-Physical Design Teams Tasked with Engineering Safe and Secure Systems for a Notional Electrified Aircraft Concept., , and . SysCon, page 1-8. IEEE, (2023)Quantum key distribution: examination of the decoy state protocol., , , , , , and . IEEE Communications Magazine, 53 (10): 24-31 (2015)Extraction and analysis of non-volatile memory of the ZW0301 module, a Z-Wave transceiver., , , and . Digital Investigation, (2016)System Safety Engineering for Social and Ethical ML Risks: A Case Study., , , , and . CoRR, (2022)Concrete Safety for ML Problems: System Safety for ML Development and Assessment., , , , and . CoRR, (2023)