Author of the publication

Implementing a performant security control for Industrial Ethernet.

, and . ICSPIS, page 1-4. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing a performant security control for Industrial Ethernet., and . ICSPIS, page 1-4. IEEE, (2018)A framework to assess impacts of cyber attacks in manufacturing., , and . ICCAE, page 127-132. ACM, (2019)Evaluation of Risks and Security Controls for Industrial Components within Connected Manufacturing.. Technical University of Munich, Germany, (2024)Security Verification of Third Party Design Files in Manufacturing., and . ICCAE, page 166-173. ACM, (2018)Integrating security evaluations into virtual commissioning., , , and . CASE, page 1193-1200. IEEE, (2020)Leveraging Edge Computing and Differential Privacy to Securely Enable Industrial Cloud Collaboration Along the Value Chain., , and . CASE, page 2023-2028. IEEE, (2021)MINERVA: Secure Collaborative Machine Tool Data Utilization Leveraging Confidentiality-Protecting Technologies., , and . Open Identity Summit, volume P-350 of LNI, page 171-176. Gesellschaft für Informatik e.V., (2024)MERCAT: A Metric for the Evaluation and Reconsideration of Certificate Authority Trustworthiness., , , , and . CCSW, page 1-15. ACM, (2019)From Standard to Practice: Towards ISA/IEC 62443-Conform Public Key Infrastructures., , , , and . SAFECOMP, volume 14181 of Lecture Notes in Computer Science, page 196-210. Springer, (2023)Future Proofing IoT Embedded Platforms for Cryptographic Primitives Support., , , , and . ICST, page 52-57. IEEE, (2018)