Author of the publication

Assessing Information Security Risks of AMI - What Makes it so Difficult?.

, , and . ICISSP, page 56-63. SciTePress, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Why securing smart grids is not just a straightforward consultancy exercise.. Secur. Commun. Networks, 7 (1): 160-174 (2014)Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared?, , , and . SEGS@CCS, page 13-22. ACM, (2014)Understanding Collaborative Challenges in IT Security Preparedness Exercises., and . SEC, volume 455 of IFIP Advances in Information and Communication Technology, page 311-324. Springer, (2015)Monitoring of Incident Response Management Performance., , , , and . IMF, volume P-97 of LNI, page 128-143. GI, (2006)Assessing Information Security Risks of AMI - What Makes it so Difficult?., , and . ICISSP, page 56-63. SciTePress, (2015)Penetration Testing of OPC as Part of Process Control Systems., , , , , and . UIC, volume 5061 of Lecture Notes in Computer Science, page 271-283. Springer, (2008)Cyber security challenges in Smart Grids., , and . ISGT Europe, page 1-8. IEEE, (2011)A study of resilience within information security in the power industry.. AFRICON, page 1-6. IEEE, (2013)Establishing a Centre for Information Security: Experiences from the Trial Period and Recommendations to Similar Initiatives., and . IMF, volume P-97 of LNI, page 43-54. GI, (2006)A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting., , and . ARES, volume 6908 of Lecture Notes in Computer Science, page 26-37. Springer, (2011)