Author of the publication

Developing and Evaluating a Hackathon Approach to Foster Cyber Security Learning.

, , and . CollabTech, volume 12324 of Lecture Notes in Computer Science, page 3-19. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A taxonomy for assessing security in business process modelling., and . RCIS, page 1-10. IEEE, (2013)Comparison of Blockchain-Based Solutions to Mitigate Data Tampering Security Risk., and . BPM (Blockchain and CEE Forum), volume 361 of Lecture Notes in Business Information Processing, page 13-28. Springer, (2019)Blockchain as a Countermeasure Solution for Security Threats of Healthcare Applications., and . BPM (Blockchain and RPA Forum), volume 428 of Lecture Notes in Business Information Processing, page 67-84. Springer, (2021)Securing an MQTT-based Traffic Light Perception System for Autonomous Driving., and . CSR, page 255-260. IEEE, (2021)Integrating Hackathons into an Online Cybersecurity Course., , and . ICSE (SEET), page 134-145. IEEE/ACM, (2022)Business Process Privacy Analysis in Pleak., , , , , , , , , and 1 other author(s). FASE, volume 11424 of Lecture Notes in Computer Science, page 306-312. Springer, (2019)An Evaluation Framework for Software Test Management Tools., and . DB&IS, volume 249 of Frontiers in Artificial Intelligence and Applications, page 235-248. IOS Press, (2012)A Method for Managing GDPR Compliance in Business Processes., , , and . CAiSE Forum, volume 386 of Lecture Notes in Business Information Processing, page 100-112. Springer, (2020)Managing Security Risks in Post-Trade Matching and Confirmation Using CorDapp., and . DB&IS, volume 1243 of Communications in Computer and Information Science, page 325-339. Springer, (2020)On the Shift to Decentralised Identity Management in Distributed Data Exchange Systems., , , and . SAC, page 864-873. ACM, (2023)