Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interoperability testing for e-government web services., , and . ICEGOV, volume 351 of ACM International Conference Proceeding Series, page 316-321. ACM, (2008)A Dynamic Cyber Security Situational Awareness Framework for Healthcare ICT Infrastructures., , and . PCI, page 334-339. ACM, (2021)Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)., , and . CoRR, (2020)Innovative, Secure and Interoperable E/M-Governmental Invoicing., , and . PIMRC, page 1-5. IEEE, (2007)Interoperability Issues of a Secure Electronic Invoicing Service (Selis)., , and . PIMRC, page 1-5. IEEE, (2007)Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)., , and . EANN, volume 1000 of Communications in Computer and Information Science, page 476-487. Springer, (2019)Cyber Threat Analysis Using Natural Language Processing for a Secure Healthcare System., , and . ISCC, page 1-7. IEEE, (2022)A Conceptual Model for Data-Driven Threat Analysis for Enhancing Cyber Security., , and . ICR, volume 1431 of Advances in Intelligent Systems and Computing, page 365-374. Springer, (2022)Exploring Cyber-Security Issues in Vessel Traffic Services., , , , and . KSEM (1), volume 11061 of Lecture Notes in Computer Science, page 442-451. Springer, (2018)Advanced security management system for critical infrastructures., , and . IISA, page 291-297. IEEE, (2014)