From post

Definition and Verification of Security Configurations of Cyber-Physical Systems.

, , , , , и . CyberICPS/SECPRE/ADIoT@ESORICS, том 12501 из Lecture Notes in Computer Science, стр. 135-155. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scmm-Tool - Tool for Computer Automation of the Information Security Management Systems., , , и . ICSOFT (SE), стр. 311-318. INSTICC Press, (2007)Building ISMS through the Reuse of Knowledge., , , и . TrustBus, том 6264 из Lecture Notes in Computer Science, стр. 190-201. Springer, (2010)Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems., , , , и . Future Internet, 8 (3): 36 (2016)New Frontiers in Security Risk Management., , , и . IT Prof., 25 (3): 61-67 (мая 2023)Security Reference Architecture for Cyber-Physical Systems (CPS)., , , , и . J. Univers. Comput. Sci., 27 (6): 609-634 (2021)Development of an Expert System for the Evaluation of Students' Curricula on the Basis of Competencies., , , , , и . Future Internet, 8 (2): 22 (2016)Definition and Verification of Security Configurations of Cyber-Physical Systems., , , , , и . CyberICPS/SECPRE/ADIoT@ESORICS, том 12501 из Lecture Notes in Computer Science, стр. 135-155. Springer, (2020)MMSM-SME: Methodology for the Management of Security and its Maturity in SME., , , и . WOSIS, стр. 67-78. INSTICC Press, (2009)Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals., , , , , , и . Frontiers Comput. Sci., 18 (3): 183808 (июня 2024)Desirable Characteristics for an ISMS oriented to SMEs., , , and . WOSIS, page 151-158. SciTePress, (2011)