Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Management of automotive software updates., , , and . Microprocess. Microsystems, (2020)A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment., , , , , , , , , and . IEEE Internet Things J., 6 (1): 288-296 (2019)Five Major Reasons Why Safety and Security Haven't Married (Yet)., , , , and . ERCIM News, (2015)Combined automotive safety and security pattern engineering approach., , , , , , , , and . Reliab. Eng. Syst. Saf., (2020)Security Application of Failure Mode and Effect Analysis (FMEA)., , , and . SAFECOMP, volume 8666 of Lecture Notes in Computer Science, page 310-325. Springer, (2014)Co-Engineering-in-the-Loop., , , and . SAFECOMP Workshops, volume 11094 of Lecture Notes in Computer Science, page 151-163. Springer, (2018)CloudWoT - A Reference Model for Knowledge-based IoT Solutions., , , , , and . iiWAS, page 272-281. ACM, (2018)Ontology-based security tool for critical cyber-physical systems., , and . SPLC (B), page 91:1-91:4. ACM, (2019)Enabling Security and Safety Evaluation in Industry 4.0 Use Cases with Digital Twins., and . ERCIM News, (2018)ThreatGet: Ensuring the Implementation of Defense-in-Depth Strategy for IIoT Based on IEC 62443., , and . ICPS, page 1-6. IEEE, (2022)