Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TESTREX: a Testbed for Repeatable Exploits., , , and . CSET, USENIX Association, (2014)Access Control Vulnerabilities in Network Protocol Implementations: How Attackers Exploit Them and What To Do About It.. SACMAT, page 5-6. ACM, (2023)Cerberus: Automated Synthesis of Enforcement Mechanisms for Security-Sensitive Business Processes., , , and . TACAS, volume 9636 of Lecture Notes in Computer Science, page 567-572. Springer, (2016)Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios., , , and . DBSec, volume 9149 of Lecture Notes in Computer Science, page 85-100. Springer, (2015)Automated Cyber Threat Intelligence Generation on Multi-Host Network Incidents., , , and . IEEE Big Data, page 2999-3008. IEEE, (2023)A dynamic risk-based access control architecture for cloud computing., , and . NOMS, page 1-9. IEEE, (2014)Leveraging Semantics for Actionable Intrusion Detection in Building Automation Systems., , , , , and . CRITIS, volume 11260 of Lecture Notes in Computer Science, page 113-125. Springer, (2018)Insecure by Design in the Backbone of Critical Infrastructure., , and . CPS-IoT Week Workshops, page 7-12. ACM, (2023)Actionable Cyber Threat Intelligence for Automated Incident Response., , , and . NordSec, volume 13700 of Lecture Notes in Computer Science, page 368-385. Springer, (2022)On Run-Time Enforcement of Authorization Constraints in Security-Sensitive Workflows., and . SEFM, volume 10469 of Lecture Notes in Computer Science, page 203-218. Springer, (2017)