Author of the publication

Towards the Evaluation of End-to-End Resilience Through External Consistency.

, , , , , , , and . CSS, volume 11161 of Lecture Notes in Computer Science, page 99-114. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Alert Characterization by Non-expert Users in a Cybersecurity Virtual Environment: A Usability Study., , and . AVR (1), volume 12242 of Lecture Notes in Computer Science, page 82-101. Springer, (2020)Towards the Evaluation of End-to-End Resilience Through External Consistency., , , , , , , and . CSS, volume 11161 of Lecture Notes in Computer Science, page 99-114. Springer, (2018)Managing the Overestimation of Resilience., , and . ARES, page 35:1-35:10. ACM, (2019)Watch Out! Doxware on the Way..., , , , and . CRiSIS, volume 12026 of Lecture Notes in Computer Science, page 279-292. Springer, (2019)AIS Authentication Using Certificateless Cryptography., , and . SECRYPT, page 49-61. SCITEPRESS, (2023)A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper)., , , and . FPS, volume 11358 of Lecture Notes in Computer Science, page 257-264. Springer, (2018)Privacy-Preserving Pattern Matching on Encrypted Data., , and . ASIACRYPT (2), volume 12492 of Lecture Notes in Computer Science, page 191-220. Springer, (2020)SONICS: A Segmentation Method for Integrated ICS and Corporate System., , and . ICISS, volume 11281 of Lecture Notes in Computer Science, page 231-250. Springer, (2018)3D CyberCOP: A Collaborative Platform for Cybersecurity Data Analysis and Training., , , , , and . CDVE, volume 11151 of Lecture Notes in Computer Science, page 176-183. Springer, (2018)Demo: Do Not Trust Your Neighbors! A Small IoT Platform Illustrating a Man-in-the-Middle Attack., , , , and . ADHOC-NOW, volume 11104 of Lecture Notes in Computer Science, page 120-125. Springer, (2018)