Author of the publication

Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols.

, , , , , and . LCN, page 1-9. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comprehensively Analyzing the Impact of Cyberattacks on Power Grids., , , , , , , , and . EuroS&P, page 1065-1081. IEEE, (2023)Veiled in clouds? Assessing the prevalence of cloud computing in the email landscape., , and . TMA, page 1-9. IEEE, (2017)A False Sense of Security?: Revisiting the State of Machine Learning-Based Industrial Intrusion Detection., , , , , , , and . CPSS@AsiaCCS, page 73-84. ACM, (2022)Can Industrial Intrusion Detection Be SIMPLE?, , , , , and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 574-594. Springer, (2022)Benchmark Evaluation of Anomaly-Based Intrusion Detection Systems in the Context of Smart Grids., , , and . ISGT EUROPE, page 1-6. IEEE, (2023)Towards Data Handling Requirements-Aware Cloud Computing., , , and . CloudCom (2), page 266-269. IEEE Computer Society, (2013)978-0-7695-5095-4.Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds., , , and . IC2E Workshops, page 130-135. IEEE Computer Society, (2016)User-Driven Privacy Enforcement for Cloud-Based Services in the Internet of Things., , , , , and . FiCloud, page 191-196. IEEE Computer Society, (2014)Piccett: Protocol-independent classification of corrupted error-tolerant traffic., , and . ISCC, page 1-7. IEEE Computer Society, (2014)Towards Transparent Information on Individual Cloud Service Usage., , , , , , , , , and 1 other author(s). CloudCom, page 366-370. IEEE Computer Society, (2016)