Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Demo on Using Visualization to Aid Run-Time Verification of Dynamic Service Systems.. ICST Workshops, page 319-324. IEEE Computer Society, (2010)Privacy-friendly Discovery of Common Friends in P2P Networks., , , and . FRUCT, page 181-188. IEEE, (2022)Visualizing structure and quality properties of Smart Spaces., , and . ISCC, page 1-3. IEEE Computer Society, (2010)Developing Reusable Knowledge Processors for Smart Environments., and . SAINT, page 286-291. IEEE Computer Society, (2011)Mitigating IoT security threats with a trusted Network element., , , and . ICITST, page 260-265. IEEE, (2016)Supporting Situation-Awareness in Smart Spaces., , and . GPC Workshops, volume 7096 of Lecture Notes in Computer Science, page 14-23. Springer, (2011)Combining real-time risk visualization and anomaly detection., , , and . ECSA (Companion), page 55:1-55:7. ACM, (2018)The Cyber-MAR Project: First Results and Perspectives on the Use of Hybrid Cyber Ranges for Port Cyber Risk Assessment., , , , , , and . CSR, page 409-414. IEEE, (2021)Building a Virtual Maritime Logistics Cybersecurity Training Platform, , , , and . (Sep 1, 2020)Programmatic Description Language for Cyber Range Topology Creation., and . EuroS&P Workshops, page 403-412. IEEE, (2022)