Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating security evaluations into virtual commissioning., , , and . CASE, page 1193-1200. IEEE, (2020)A fuzzy decision tool to evaluate the sustainable performance of suppliers in an agrifood value chain., , , and . Comput. Ind. Eng., (2019)iTOP: Automating Counterfeit Object-Oriented Programming Attacks., , , , , and . RAID, page 162-176. ACM, (2021)Technologie-Entwicklungen und Probleme auf dem Weg zum Future Net.. DFN-Arbeitstagung über Kommunikationsnetze, volume P-55 of LNI, page 433-449. GI, (2004)IT-Sicherheit. Oldenbourg, München u.a., 2., überarb. und erw. Aufl. edition, (2003)Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance., , , , , , , , , and 4 other author(s). CoRR, (2021)Knitwear Customisation as Repeated Redesign., and . MCPC, page 90:1-90:9. Technical University Munich, (2003)Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic., , , and . ISC, volume 13118 of Lecture Notes in Computer Science, page 259-278. Springer, (2021)Konzept für ein deutschlandweites Krankheitsnetz am Beispiel von mitoREGISTER., , , , , , , and . GI Jahrestagung (2), volume P-176 of LNI, page 746-751. GI, (2010)Der elektronische Sicherheitsinspektor eSI: Ein Tool zur dynamischen Analyse der IT-Sicherheit eines Systems., , and . DFN-Arbeitstagung über Kommunikationsnetze, volume P-44 of LNI, page 143-152. GI, (2003)