Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attack Surface Assessment for Cybersecurity Engineering in the Automotive Domain., , , , , and . PDP, page 266-275. IEEE, (2021)Digitale Ausweise - Möglichkeiten und Empfehlungen aus technischer Sicht. Datenschutz und Datensicherheit, 29 (2): 66-68 (2005)Risk Assessment Graphs: Utilizing Attack Graphs for Risk Assessment., , , , and . CoRR, (2023)ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering., , , , and . Microprocess. Microsystems, (April 2022)On biometric key generation from handwritten signatures., , and . BIOSIG, volume P-191 of LNI, page 103-114. GI, (2011)Addressing Industry 4.0 Security by Software-Defined Networking., , , , and . Guide to Security in SDN and NFV, Springer, (2017)Umfassende Sicherheit: Safety und Security im Kontext autonomer Systeme, , , , , , , , , and . Informatik-Spektrum, 40 (5): 419--429 (October 2017)Technology and security forecast for the railway system – the timely identification of threats, , , , and . Signalling+Datacommunication, (September 2022)Technologie- und Securityprognose System Bahn – Bedrohungen rechtzeitig erkennen, , , , and . Signal+Draht, (September 2022)Minutiae template conformance and interoperability issues., and . BIOSIG, volume P-108 of LNI, page 25-32. GI, (2007)