Author of the publication

Network Scanning and Mapping for IIoT Edge Node Device Security.

, , , and . Computing Research Repository CoRR, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation., , , , and . Computing Research Repository CoRR, (2019)Impact of Active Scanning Tools for Device Discovery in Industrial Networks., , , , , and . SpaCCS Workshops, volume 12383 of Lecture Notes in Computer Science, page 557-572. Springer, (2020)Salt&Pepper: Spice up Security Behavior with Cognitive Triggers., , and . EICC, page 26-31. ACM, (2021)CoRT: A Communication Robustness Testbed for Industrial Control System Components., , and . CoRR, (2019)Hardware Trojans: current challenges and approaches., , , and . IET Comput. Digit. Tech., 8 (6): 264-273 (2014)CARE REGIO – Digital Transformation and Technology in Nursing Care, , , , , , , , , and 9 other author(s). Studies in Health Technology and Informatics, IOS Press, (January 2022)A Secure Network Scanner Architecture for Asset Management in Strongly Segmented ICS Networks., , , and . ICISSP, page 347-355. SCITEPRESS, (2021)A Secure Dual-MCU Architecture for Robust Communication of IIoT Devices, , and . Mediterranean Conference on Embedded Computing (MECO); IEEE, (2019)Testbed for Functional Safety-Relevant Wireless Communication Based on IO-Link Wireless and 5G., , , , and . CoRR, (2022)CARE REGIO - Digital Transformation and Technology in Nursing Care., , , , , , , , , and 9 other author(s). ICIMTH, volume 289 of Studies in Health Technology and Informatics, page 286-289. IOS Press, (2021)