Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security based design space exploration for CPS., , , , and . SAC, page 593-595. ACM, (2020)Multi-Layered IoT System Design Towards End-to-End Secure Communication., , , , , and . IECON, page 2213-2220. IEEE, (2020)Towards Security Attack and Risk Assessment during Early System Design., , , and . Cyber Security, page 1-8. IEEE, (2020)Consideration of Security Attacks in the Design Space Exploration of Embedded Systems., , and . DSD, page 530-537. IEEE, (2019)Security Driven Design Space Exploration for Embedded Systems., , and . FDL, page 1-8. IEEE, (2019)A Design Exploration Framework for Secure IoT-Systems., , , , and . CyberSA, page 1-8. IEEE, (2020)Message Encapsulation Pattern., , and . EuroPLoP, page 17:1-17:6. ACM, (2018)Design Space Exploration for Secure IoT Devices and Cyber-Physical Systems., , and . ACM Trans. Embed. Comput. Syst., 20 (4): 32:1-32:24 (2021)Design and Implementation of an HCI Based Peer to Peer APDU Protocol., , and . DSD, page 159-162. IEEE Computer Society, (2018)Towards an Automated Exploration of Secure IoT/CPS Design-Variants., , , and . SAFECOMP, volume 12234 of Lecture Notes in Computer Science, page 372-386. Springer, (2020)