Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating digital twin security simulations in the security operations center., , and . ARES, page 18:1-18:9. ACM, (2020)Introducing DINGfest: An architecture for next generation SIEM systems., , , , , , and . Sicherheit, volume P-281 of LNI, page 257-260. Gesellschaft für Informatik e.V., (2018)Train as you Fight: Evaluating Authentic Cybersecurity Training in Cyber Ranges., , and . CHI, page 622:1-622:19. ACM, (2023)Bridging Knowledge Gaps in Security Analytics., , and . ICISSP, page 98-108. SCITEPRESS, (2021)Visual Programming in Cyber Range Training to Improve Skill Development., , , , and . HAISA, volume 658 of IFIP Advances in Information and Communication Technology, page 3-13. Springer, (2022)Elevating TARA: A Maturity Model for Automotive Threat Analysis and Risk Assessment., , , , and . ARES, page 189:1-189:9. ACM, (2024)A Digital Twin-Based Cyber Range for SOC Analysts., , , , , and . DBSec, volume 12840 of Lecture Notes in Computer Science, page 293-311. Springer, (2021)Security Operations Center Roles and Skills: A Comparison of Theory and Practice., , , and . DBSec, volume 13383 of Lecture Notes in Computer Science, page 316-327. Springer, (2022)Security Operations Center: A Systematic Study and Open Challenges., , , and . IEEE Access, (2020)BISCUIT - Blockchain Security Incident Reporting based on Human Observations., , and . ARES, page 27:1-27:6. ACM, (2022)