Author of the publication

A Generic Approach to Critical Infrastructure Modeling and Simulation.

, , , and . CyberSecurity, page 144-151. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulation-Based Cyber-Attack Assessment of Critical Infrastructures., , and . EOMAS@CAiSE, volume 191 of Lecture Notes in Business Information Processing, page 135-150. Springer, (2014)A Comprehensive Literature Review of File Carving., and . ARES, page 475-484. IEEE Computer Society, (2013)Facebook Watchdog: A Research Agenda for Detecting Online Grooming and Bullying Activities., , and . SMC, page 2854-2859. IEEE, (2013)Evidence and Cloud Computing: The Virtual Machine Introspection Approach., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 4 (1): 135-152 (2013)Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art., and . IMF, page 48-61. IEEE Computer Society, (2011)Taxonomy of Data Fragment Classification Techniques., , and . ICDF2C, volume 132 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 67-85. Springer, (2013)A Generic Approach to Critical Infrastructure Modeling and Simulation., , , and . CyberSecurity, page 144-151. IEEE Computer Society, (2012)A Discussion of Visualization Techniques for the Analysis of Digital Evidence., and . ARES, page 758-763. IEEE Computer Society, (2011)Discussion on the Challenges and Opportunities of Cloud Forensics., and . CD-ARES, volume 7465 of Lecture Notes in Computer Science, page 593-608. Springer, (2012)Advanced File Carving Approaches for Multimedia Files., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2 (4): 42-58 (2011)