Author of the publication

Towards Secure Time-Triggered Systems.

, , , , , , , and . SAFECOMP Workshops, volume 7613 of Lecture Notes in Computer Science, page 365-372. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Keine Cyber-Sicherheit ohne Datenschutz., , and . Datenschutz und Datensicherheit, 39 (11): 723-729 (2015)Information Management and Sharing for National Cyber Situational Awareness., , and . ISSE, page 217-227. Springer, (2012)Discovering and Managing Social Compositions in Collaborative Enterprise Crowdsourcing Systems., , and . Int. J. Cooperative Inf. Syst., 21 (4): 297-342 (2012)Managing social overlay networks in semantic open enterprise systems., , and . WIMS, page 50. ACM, (2011)An Analysis of the Structure and Dynamics of Large-Scale Q/A Communities., and . ADBIS, volume 6909 of Lecture Notes in Computer Science, page 285-301. Springer, (2011)Kyoushi Testbed Environment: A Model-driven Simulation Framework to Generate Open Log Data Sets for Security Evaluations., , , and . ERCIM News, 2022 (129): 0 (2022)AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research., , , , , , , , , and . EICC, page 2:1-2:6. ACM, (2020)A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation., , , , , and . SAT-CPS@CODASPY, page 77-86. ACM, (2022)Supporting Network Formation through Mining under Privacy Constraints., , and . SAINT, page 105-108. IEEE Computer Society, (2010)Computational Social Network Management in Crowdsourcing Environments., , and . ICECCS, page 273-282. IEEE Computer Society, (2011)