Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing the Implications of Design Choices in Existing Simulation-Games for Critical Infrastructure Resilience., , , , , and . ISAGA, volume 10825 of Lecture Notes in Computer Science, page 15-23. Springer, (2017)A Unified Situation Analysis Model for Human and Machine Situation Awareness., , , , , , , , , and 1 other author(s). GI Jahrestagung (2), volume P-110 of LNI, page 105-109. GI, (2007)Formalizing Operations Intent and Effects for Network-Centric Applications., , , , and . HICSS, page 1-10. IEEE Computer Society, (2009)A System Theoretical Approach to Situation Awareness, A Holistic View of Purposeful Elements., , and . FUSION, page 1-7. IEEE, (2006)Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem., , , and . EISIC, page 139-142. IEEE, (2013)Multi-hypothesis intention simulation based agent architecture.. WSC, page 13. IEEE Computer Society, (2005)Challenges for critical infrastructure resilience: cascading effects of payment system disruptions., , , , , , , , and . ISCRAM, ISCRAM Association, (2017)Towards a Framework to Detect Multi-stage Advanced Persistent Threats Attacks., , and . SOSE, page 390-395. IEEE Computer Society, (2014)Signature-based activity detection based on Bayesian networks acquired from expert knowledge., , , and . FUSION, page 436-443. IEEE, (2009)Experiences from the annual 24-hour software engineering competition at University of Skövde: how to use simulation for detecting good software engineers., , , , and . WSC, page 25. IEEE Computer Society, (2005)