Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Incident Information Exchange for Cloud Services., , , and . IoTBD, page 391-398. SciTePress, (2016)Improving smart grid security through 5G enabled IoT and edge computing., , , and . Concurr. Comput. Pract. Exp., (2021)Putting the Äccount" into Cloud Accountability.. CLOSER, page 9-18. SciTePress, (2019)GPRS Security for Smart Meters., , and . CD-ARES, volume 8127 of Lecture Notes in Computer Science, page 195-207. Springer, (2013)A Secure MANET Routing Protocol for Crisis Situations., , and . Int. J. Syst. Softw. Secur. Prot., 9 (4): 17-45 (2018)The Security Intention Meeting Series as a way to increase visibility of software security decisions in agile development projects., , , and . ARES, page 59:1-59:8. ACM, (2019)Tackling the Cloud Forensic Problem While Keeping Your Eye on the GDPR., and . CloudCom, page 418-423. IEEE, (2019)5G as an Enabler for Secure IoT in the Smart Grid : Invited Paper., and . SA, page 1-7. IEEE, (2019)Towards Improved Understanding and Holistic Management of the Cyber Security Challenges in Power Transmission Systems., , , and . CD-ARES, volume 8127 of Lecture Notes in Computer Science, page 240-255. Springer, (2013)Current practices and challenges in industrial control organizations regarding information security incident management - Does size matter? Information security incident management in large and small industrial control organizations., , and . Int. J. Crit. Infrastructure Prot., (2016)