Author of the publication

Victim Communication Stack (VCS): A flexible model to select the Human Attack Vector.

, , , and . ARES, page 50:1-50:6. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Victim Communication Stack (VCS): A flexible model to select the Human Attack Vector., , , and . ARES, page 50:1-50:6. ACM, (2017)Echo-Cardiography on the Web: Design and Set-Up of a Virtual Community of Experts., , and . SAC, page 240-245. ACM, (2003)Restoration of Noisy Underwater Acoustic Images Using Markov Random Fields., , and . ICIAP, volume 974 of Lecture Notes in Computer Science, page 355-360. Springer, (1995)An innovative and comprehensive framework for Social Driven Vulnerability Assessment, and . page 15-36. Magdeburger Institut für Sicherheitsforschung, Magdeburg, (2015)Yet Another Cybersecurity Roadmapping Methodology., , , , , , and . ARES, page 719-726. IEEE Computer Society, (2015)An MPEG2 compliant PSNR controller for a constant high quality studio enviorment., and . EUSIPCO, page 1-4. IEEE, (1998)An innovative and comprehensive framework for Social Driven Vulnerability Assessment, and . 8 (2): 493-505 (2014)An Innovative Approach to Research and Development: The CEFRIEL Experience., , , and . MedInfo, volume 84 of Studies in Health Technology and Informatics, page 1125-1129. IOS Press, (2001)GQM-Based Definition and Evaluation of Software Project Success Indicators., , and . ICSOFT (Selected Papers), volume 586 of Communications in Computer and Information Science, page 228-249. Springer, (2015)The HERMENEUT Project: Enterprises Intangible Risk Management via Economic Models based on Simulation of Modern Cyber Attacks., and . ICISSP, page 495-502. SciTePress, (2019)