Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantification and Localization of Cross-Core Interference for Embedded Multi-Core Control Applications., , and . ICSCA, page 189-193. ACM, (2018)Artifact: SoK: Evaluations in Industrial Intrusion Detection Research., , , , , , and . (October 2023)Manipulating multi-core interferences for sensorless electrical drive applications on implementation level., , and . IECON, page 6681-6686. IEEE, (2016)HighTecBot - Ein Roboter-Baukastensystem zur Unterstützung der Informatik-Lehre an Hochschulen., , and . Echtzeit, page 41-50. Springer, (2008)Mental Health Promotion with Animated Characters: Exploring Issues and Potential., and . AAAI Spring Symposium: Emotion, Personality, and Social Behavior, page 72-79. AAAI, (2008)PowerDuck: A GOOSE Data Set of Cyberattacks in Substations., , , , , and . CSET @ USENIX Security Symposium, page 49-53. ACM, (2022)One IDS Is Not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection., , , , , and . ESORICS (2), volume 14345 of Lecture Notes in Computer Science, page 102-122. Springer, (2023)Facilitating Protocol-independent Industrial Intrusion Detection Systems., , and . CCS, page 2105-2107. ACM, (2020)Towards Frame-Based Source Code Generation for Heterogeneous Real-Time Environments., and . CESCIT, page 212-217. International Federation of Automatic Control, (2012)radarsec-lab., , , , , , , , and . (October 2022)