Author of the publication

Identification of security threats, safety hazards, and interdependencies in industrial edge computing.

, , , and . SEC, page 397-402. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of Open Building Automation Systems., and . SAFECOMP, volume 6351 of Lecture Notes in Computer Science, page 303-316. Springer, (2010)GOLD MINE: Specification Language for Event-Based Monitoring., , and . CONPAR, volume 854 of Lecture Notes in Computer Science, page 88-99. Springer, (1994)The relevance and impact of IPv6 multicasting for Wireless Sensor and Actuator Networks based on 6LoWPAN and constrained RESTful environments., , and . IOT, page 7-12. IEEE, (2014)Integration of smart meters into management systems in automation., and . WFCS, page 1-4. IEEE, (2014)Information modeling in heterogeneous Building Automation Systems., and . WFCS, page 291-300. IEEE, (2012)Jini - ein guter Geist für die Gebäudesystemtechnik., , and . Java-Informations-Tage, page 213-222. Springer, (1999)Interoperability at the management level of building automation systems: A case study for BACnet and OPC UA., , and . ETFA, page 1-8. IEEE, (2011)Procedure-based availability SLAs for Traffic Management Systems., , , and . ETFA, page 1-8. IEEE, (2011)Secure and customizable software applications in embedded networks., , and . ETFA, page 1473-1480. IEEE, (2008)Context-aware optimization strategies for universal application in smart building energy management., and . INDIN, page 478-483. IEEE, (2018)