Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending MUD to Smartphones., , and . LCN, page 353-356. IEEE, (2020)PowerDuck: A GOOSE Data Set of Cyberattacks in Substations., , , , , and . CSET @ USENIX Security Symposium, page 49-53. ACM, (2022)Comprehensively Analyzing the Impact of Cyberattacks on Power Grids., , , , , , , , and . EuroS&P, page 1065-1081. IEEE, (2023)On the benefits of cooperation for dependable wireless communications.. RWTH Aachen University, Germany, (2021)DEMONS: Extended Manufacturer Usage Description to Restrain Malicious Smartphone Apps., , and . LCN, page 463-470. IEEE, (2021)QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation., , , and . Networking, page 386-394. IEEE, (2020)Finite Blocklength Performance of Cooperative Multi-Terminal Wireless Industrial Networks., , , and . IEEE Trans. Veh. Technol., 67 (7): 5778-5792 (2018)BP-MAC: Fast Authentication for Short Messages., , , and . WISEC, page 201-206. ACM, (2022)An Interdisciplinary Survey on Information Flows in Supply Chains., , , , , , , , , and 5 other author(s). CoRR, (2024)Finite Blocklength Performance of Multi-Terminal Wireless Industrial Networks., , , and . CoRR, (2016)