Author of the publication

RISKEE: A Risk-Tree Based Method for Assessing Risk in Cyber Security.

, , , and . EuroSPI, volume 1060 of Communications in Computer and Information Science, page 45-56. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software-Based Fault Recovery via Adaptive Diversity for COTS Multi-Core Processors., , , , and . CoRR, (2015)Towards Integrated Quantitative Security and Safety Risk Assessment., , , and . SAFECOMP Workshops, volume 11699 of Lecture Notes in Computer Science, page 102-116. Springer, (2019)Dependable mesh networking patterns., , , , and . EuroPLoP, page 25:1-25:14. ACM, (2019)Towards a security-driven automotive development lifecycle., , , , and . J. Softw. Evol. Process., (August 2023)Consistency of Cybersecurity Process and Product Assessments in the Automotive Domain., , , , , , , and . EuroSPI (1), volume 1890 of Communications in Computer and Information Science, page 343-355. Springer, (2023)A Seamless Self-configuring EtherCAT Master Redundancy Protocol., , , , and . EuroSPI, volume 1251 of Communications in Computer and Information Science, page 381-395. Springer, (2020)Automotive Cybersecurity Engineering Job Roles and Best Practices - Developed for the EU Blueprint Project DRIVES., , , , , , and . EuroSPI, volume 1251 of Communications in Computer and Information Science, page 499-510. Springer, (2020)Automotive Cybersecurity - Training the Future., , , , , , , , , and 1 other author(s). EuroSPI, volume 1442 of Communications in Computer and Information Science, page 211-219. Springer, (2021)First Experiences with the Automotive SPICE for Cybersecurity Assessment Model., , , , , , and . EuroSPI, volume 1442 of Communications in Computer and Information Science, page 531-547. Springer, (2021)ThreatGet: Ensuring the Implementation of Defense-in-Depth Strategy for IIoT Based on IEC 62443., , and . ICPS, page 1-6. IEEE, (2022)