Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Specification-based Cyber-Attack Detection in Smart Grids., , , , , , , and . CoRR, (2022)Cybersecurity in Power Grids: Challenges and Opportunities., , , , and . CoRR, (2021)Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring., , , , and . CCS, page 3463-3465. ACM, (2022)When and How to Aggregate Message Authentication Codes on Lossy Channels?, , , and . ACNS (2), volume 14584 of Lecture Notes in Computer Science, page 241-264. Springer, (2024)A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems., , , , , , and . HICSS, page 1-10. ScholarSpace, (2019)METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks., , , and . ESORICS Workshops (1), volume 14398 of Lecture Notes in Computer Science, page 25-45. Springer, (2023)CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps., , , , , , and . MobiQuitous, page 262-271. ACM, (2017)Privacy-Preserving HMM Forward Computation., , , , and . CODASPY, page 83-94. ACM, (2017)Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes., , and . WISEC, page 207-221. ACM, (2022)Practical Data Compliance for Cloud Storage., , , , , , and . IC2E, page 252-258. IEEE Computer Society, (2017)