Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dealing with Privacy for Protecting Information., and . EuroSPI, volume 1442 of Communications in Computer and Information Science, page 518-530. Springer, (2021)Security Debt: Characteristics, Product Life-Cycle Integration and Items., , , , , and . TechDebt@ICSE, page 1-5. IEEE, (2021)Comparing SPI Survival Studies in Small Settings., and . SPICE, volume 770 of Communications in Computer and Information Science, page 45-54. Springer, (2017)Towards a Survival Analysis of Very Small Organisations., and . EuroSPI, volume 748 of Communications in Computer and Information Science, page 599-609. Springer, (2017)A Harmonized Multimodel Framework for Safety Environments., , and . EuroSPI, volume 301 of Communications in Computer and Information Science, page 121-132. Springer, (2012)Approach for Enabling Security Across PLC Phases: An Industrial Use Case., , , and . EuroSPI, volume 896 of Communications in Computer and Information Science, page 354-367. Springer, (2018)Microservices., , , and . IEEE Softw., 35 (3): 96-100 (2018)Dealing with Security in a Real DevOps Environment., , and . EuroSPI, volume 1060 of Communications in Computer and Information Science, page 453-464. Springer, (2019)Designing a Cyber Range Exercise for Educational Purposes., and . EuroSPI, volume 1251 of Communications in Computer and Information Science, page 302-312. Springer, (2020)Estimating the time-varying periodicity of epileptiform discharges in the electroencephalogram., , , , and . ISSPA, page 1229-1234. IEEE, (2012)