Author of the publication

Toward Findable, Accessible, Interoperable, and Reusable Cybersecurity Artifacts.

, , , , , , and . CSET @ USENIX Security Symposium, page 65-70. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber Security Awareness Requirements for Operational Technology Systems., , and . Critical Infrastructure Protection, volume 636 of IFIP Advances in Information and Communication Technology, page 23-44. Springer, (2021)Crossing the "Valley of Death": Transitioning Cybersecurity Research into Practice., , , and . IEEE Secur. Priv., 11 (2): 14-23 (2013)Toward Findable, Accessible, Interoperable, and Reusable Cybersecurity Artifacts., , , , , , and . CSET @ USENIX Security Symposium, page 65-70. ACM, (2022)A Comparative Analysis Approach for Deriving Failure Scenarios in the Natural Gas Distribution Infrastructure., and . Critical Infrastructure Protection, volume 570 of IFIP Advances in Information and Communication Technology, page 19-50. Springer, (2019)Cyber State Requirements for Design and Validation of Trust in the Critical Transportation Infrastructure., , and . Critical Infrastructure Protection, volume 596 of IFIP Advances in Information and Communication Technology, page 69-83. Springer, (2020)Cyber Risk Economics Capability Gaps Research Strategy., , and . CyberSA, page 1-6. IEEE, (2018)Security Aspects of a UNIX PEM Implementation., and . USENIX Summer, USENIX Association, (1992)Government-Funded R&D to Drive Cybersecurity Technologies., , , and . IT Prof., 17 (4): 62-65 (2015)Barriers to science in security., , and . ACSAC, page 127-129. ACM, (2010)