Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Everything Is Awesome! or Is It? Cyber Security Risks in Critical Infrastructure., , , and . CRITIS, volume 11777 of Lecture Notes in Computer Science, page 3-17. Springer, (2019)Basic Cyber Hygiene: Does It Work?, , , , and . Computer, 52 (4): 21-31 (2019)Technical Report: Gone in 20 Seconds - Overview of a Password Vulnerability in Siemens HMIs., and . CoRR, (2020)Software Engineering for Social Sustainability., , and . EnviroInfo/ICT4S (2), page 251-252. University of Copenhagen, (2015)Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe, , , , , , , and . Computer, 43 (2): 19-26 (2010)Detecting broken pointcuts using structural commonality and degree of interest., , , and . Sci. Comput. Program., (2017)Object Database Evolution Using Separation of Concerns., and . SIGMOD Record, 29 (4): 26-33 (2000)Interventions for software security: creating a lightweight program of assurance techniques for developers., , , , , and . ICSE (SEIP), page 41-50. IEEE / ACM, (2019)Facilitating Virtual Representation of CAD Data Through A Learning Based Approach to Conceptual Database Evolution Employing Direct Instance Sharing., and . DEXA, volume 1460 of Lecture Notes in Computer Science, page 384-393. Springer, (1998)Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy., , and . Proc. Priv. Enhancing Technol., 2019 (2): 209-227 (2019)