Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Veiled in clouds? Assessing the prevalence of cloud computing in the email landscape., , and . TMA, page 1-9. IEEE, (2017)A False Sense of Security?: Revisiting the State of Machine Learning-Based Industrial Intrusion Detection., , , , , , , and . CPSS@AsiaCCS, page 73-84. ACM, (2022)Comprehensively Analyzing the Impact of Cyberattacks on Power Grids., , , , , , , , and . EuroS&P, page 1065-1081. IEEE, (2023)Benchmark Evaluation of Anomaly-Based Intrusion Detection Systems in the Context of Smart Grids., , , and . ISGT EUROPE, page 1-6. IEEE, (2023)Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds., , , and . IC2E Workshops, page 130-135. IEEE Computer Society, (2016)Piccett: Protocol-independent classification of corrupted error-tolerant traffic., , and . ISCC, page 1-7. IEEE Computer Society, (2014)SoK Evaluations in Industrial Intrusion Detection Research., , , , , , and . J. Syst. Res., (2023)Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols., , , , , and . LCN, page 1-9. IEEE, (2023)Towards Secure 5G Infrastructures for Production Systems., , , , , , , , , and . ACNS Workshops (2), volume 14587 of Lecture Notes in Computer Science, page 198-203. Springer, (2024)Towards Data Handling Requirements-Aware Cloud Computing., , , and . CloudCom (2), page 266-269. IEEE Computer Society, (2013)978-0-7695-5095-4.