Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps., , , , , , and . MobiQuitous, page 262-271. ACM, (2017)Privacy-Preserving HMM Forward Computation., , , , and . CODASPY, page 83-94. ACM, (2017)Cybersecurity in Power Grids: Challenges and Opportunities., , , , and . CoRR, (2021)On Specification-based Cyber-Attack Detection in Smart Grids., , , , , , , and . CoRR, (2022)Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes., , and . WISEC, page 207-221. ACM, (2022)Cybersecurity Research and Training for Power Distribution Grids - A Blueprint., , , , , and . CCS, page 2097-2099. ACM, (2020)Secure Low Latency Communication for Constrained Industrial IoT Scenarios., , , , , and . LCN, page 614-622. IEEE, (2018)Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring., , , , and . CCS, page 3463-3465. ACM, (2022)When and How to Aggregate Message Authentication Codes on Lossy Channels?, , , and . ACNS (2), volume 14584 of Lecture Notes in Computer Science, page 241-264. Springer, (2024)A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems., , , , , , and . HICSS, page 1-10. ScholarSpace, (2019)