Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Z-Wave routing protocol and its security implications., , , , and . Comput. Secur., (2017)Concrete Safety for ML Problems: System Safety for ML Development and Assessment., , , , and . CoRR, (2023)Considerations for secure and resilient satellite architectures., , , and . CyCon U.S., page 16-22. IEEE Computer Society, (2017)Autonomous Space Resupply Vehicle Systems Security Design Principle Case Study., and . CNS, page 1-8. IEEE, (2020)A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System., , , and . SysCon, page 1-7. IEEE, (2019)Examination of security design principles from NIST SP 800-160., , and . SysCon, page 1-8. IEEE, (2018)Considerations for Cyber-Physical Design Teams Tasked with Engineering Safe and Secure Systems for a Notional Electrified Aircraft Concept., , and . SysCon, page 1-8. IEEE, (2023)A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems., , , and . Cyber Security, page 1-8. IEEE, (2018)Putting the "Systems" in Security Engineering: An Examination of NIST Special Publication 800-160., , , and . IEEE Secur. Priv., 14 (4): 76-80 (2016)Modeling Quantum Optical Components, Pulses and Fiber Channels Using OMNeT++., , , , , and . CoRR, (2015)