Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulation Debugging and Visualization in the Möbius Modeling Framework., and . QEST, volume 8657 of Lecture Notes in Computer Science, page 226-240. Springer, (2014)A Comparison of Different Intrusion Detection Approaches in an Advanced Metering Infrastructure Network Using ADVISE., , , and . QEST, volume 9826 of Lecture Notes in Computer Science, page 279-294. Springer, (2016)Automatically Generating Security Models from System Models to Aid in the Evaluation of AMI Deployment Options., , , and . CRITIS, volume 10707 of Lecture Notes in Computer Science, page 156-167. Springer, (2017)Accounting for the Human User in Predictive Security Models., , , , and . PRDC, page 329-338. IEEE Computer Society, (2017)Remote Job Management in the Mobius Modeling Framework., , , and . QEST, page 209-210. IEEE Computer Society, (2009)Möbius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models., , , , and . DSN, page 353-358. IEEE Computer Society, (2009)Quantitative security metrics with human in the loop., , , and . HotSoS, page 21:1-21:2. ACM, (2015)Reliability Analysis with Dynamic Reliability Block Diagrams in the Möbius Modeling Tool., and . EAI Endorsed Trans. Security Safety, 3 (10): e3 (2016)Möbius Shell: A Command-Line Interface for Möbius., and . QEST, volume 8054 of Lecture Notes in Computer Science, page 282-285. Springer, (2013)Implementing the ADVISE security modeling formalism in Möbius., , , , and . DSN, page 1-8. IEEE Computer Society, (2013)