Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic building change detection through adaptive local textural features and sequential background removal., , , and . IGARSS, page 2857-2860. IEEE, (2016)Exploring the Representation of Cyber-Risk Data Through Sketching., , and . VizSec, page 22-32. IEEE, (2023)Extended Abstract - Transformers: Intrusion Detection Data in Disguise., , and . CyberICPS/SECPRE/ADIoT@ESORICS, volume 12501 of Lecture Notes in Computer Science, page 253-263. Springer, (2020)Towards a Correct-by-Construction Design of Integrated Modular Avionics., , , , , , , , , and 2 other author(s). FMCAD, page 221-227. IEEE, (2023)Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research., , , , and . ICS-CSR, BCS, (2013)PCaaD: Towards automated determination and exploitation of industrial systems., , , , , and . Comput. Secur., (2021)ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource., , , , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2020)A Lot Less Likely Than I Thought: Introducing Evidence-Based Security Risk Assessment for Healthcare Software., , and . SecDev, page 156-170. IEEE, (2023)An Analysis of Cyber Security Attack Taxonomies., , , , and . EuroS&P Workshops, page 153-161. IEEE, (2018)On Demand Network Level Service Deployment in Ad Hoc Networks., , and . PWC, volume 2775 of Lecture Notes in Computer Science, page 817-822. Springer, (2003)