From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dataset - Architectural Attack Propagation Analysis for Identifying Confidentiality Issues., , и . ICSA Companion, стр. 59. IEEE, (2022)Context-based Access Control and Attack Modelling and Analysis.. Karlsruhe Institute of Technology, Germany, (2024)base-search.net (ftubkarlsruhe:oai:EVASTAR-Karlsruhe.de:1000166069).Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0., , , , , и . Autom., 71 (6): 443-452 (июня 2023)A Taxonomy of Dynamic Changes Affecting Confidentiality., , и . Softwaretechnik-Trends, 40 (2): 35-36 (2020)Dynamic Access Control in Industry 4.0 Systems., , , , , , , и . Digital Transformation, Springer, (2022)Aspect-Oriented Adaptation of Access Control Rules., , , , , и . SEAA, стр. 363-370. IEEE, (2021)Modeling of dynamic trust contracts for industry 4.0 systems., , , , , и . ECSA (Companion), стр. 45:1-45:4. ACM, (2018)Architecture-based Propagation Analyses Regarding Security., , , и . Software Engineering, том P-343 из LNI, стр. 121-122. Gesellschaft für Informatik e.V., (2024)Stabilisierungspolitik. Wissen kompakt Verl. Wiss. & Praxis, Sternenfels u.a., (1998)Tool-Based Attack Graph Estimation and Scenario Analysis for Software Architectures., и . ECSA (Tracks and Workshops), том 13928 из Lecture Notes in Computer Science, стр. 45-61. Springer, (2022)