Author of the publication

Integrating attacker behavior in IT security analysis: a discrete-event simulation approach.

, , , , and . Inf. Technol. Manag., 16 (3): 221-233 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ontological Mapping of Common Criteria's Security Assurance Requirements., , , and . SEC, volume 232 of IFIP, page 85-95. Springer, (2007)Securing Cyber-Physical Systems through Digital Twins., and . ERCIM News, (2018)Digital Twins for Cyber-Physical Threat Detection and Response., , and . ERCIM News, 2021 (126): 0 (2021)Formalizing information security knowledge., and . AsiaCCS, page 183-194. ACM, (2009)Securing the testing process for industrial automation software., , , and . Comput. Secur., (2019)Anonymisation of Heterogeneous Graphs with Multiple Edge Types., , and . DEXA (1), volume 13426 of Lecture Notes in Computer Science, page 130-135. Springer, (2022)An Efficient Approach for Anonymising the Structure of Heterogeneous Graphs., , and . IEEE Big Data, page 5783-5791. IEEE, (2022)An evaluation of technologies for the pseudonymization of medical data., and . SAC, page 857-858. ACM, (2009)Interactive Selection of ISO 27001 Controls under Multiple Objectives., , and . SEC, volume 278 of IFIP, page 477-492. Springer, (2008)Cross-Platform File System Activity Monitoring and Forensics - A Semantic Approach., , , and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 384-397. Springer, (2020)