Author of the publication

Security-Driven Information Flow Modelling for Component Integration in Complex Environments.

, , and . IAIT, page 19:1-19:8. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tis/mm., and . ENTER, page 80-86. Springer, (1994)An Approach to Supporting Militia Collaboration in Disaster Relief Through a Digital Environment., , and . I4CS, volume 1404 of Communications in Computer and Information Science, page 41-56. Springer, (2021)Enhancing credibility of digital evidence through provenance-based incident response handling., , , and . ARES, page 26:1-26:6. ACM, (2019)CloudWoT - A Reference Model for Knowledge-based IoT Solutions., , , , , and . iiWAS, page 272-281. ACM, (2018)Cyber Exercises in Computer Science Education., , , , and . ICISSP, page 404-411. SCITEPRESS, (2022)VloGraph: A Virtual Knowledge Graph Framework for Distributed Security Log Analysis., , , , , and . Mach. Learn. Knowl. Extr., 4 (2): 371-396 (2022)Security-Driven Information Flow Modelling for Component Integration in Complex Environments., , and . IAIT, page 19:1-19:8. ACM, (2018)Open Texture and Knowledge Representation.. Terminology and Knowledge Engineering, page 87-91. Indeks Verlag, Frankfurt Main, (1993)Konzeptionelle Vorschläge für eine umfassende IT-Unterstützung von Richtern und Staatsanwälten sowie Ansätze zu ihrer Realisierung auf der Grundlage vernetzbarer PCs des Industriestandards., and . GI Jahrestagung, volume 156 of Informatik-Fachberichte, page 713-728. Springer, (1987)Ontology-Based Model for Automotive Security Verification and Validation., , , , , and . iiWAS, page 73-82. ACM, (2019)