Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A strategy evaluation framework based on dynamic vulnerability assessments., , and . ISCRAM, ISCRAM Association, (2014)A Multi-Agent System for Studying Cross-Border Disaster Resilience., , , , , , , , , and . ISCRAM, ISCRAM Association, (2018)Knowledge Engineering for Wind Energy., , , , , , , , , and 1 other author(s). CoRR, (2023)The Effect of Coping Capacity Depletion on Critical Infrastructure Resilience., , and . ISCRAM, ISCRAM Association, (2015)A multi-stage scenario construction approach for critical infrastructure protection., , , and . ISCRAM, ISCRAM Association, (2014)Cyber threat intelligence enabled automated attack incident response., , , , , and . NextComp, page 1-6. IEEE, (2022)Critical Infrastructure Resilience: A Framework for Considering Micro and Macro Observation Levels., , , , , and . ISCRAM, ISCRAM Association, (2015)Requirements on Super-Short-Term Wind Speed Predictions for Model Predictive Wind Turbine Control., , , , and . ECC, page 3346-3352. IEEE, (2019)Spontaneous Volunteers Across National Borders: An Agent-Based Comparison., , , and . ISCRAM, page 327-336. ISCRAM Digital Library, (2020)Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph., , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (6): 4793-4809 (November 2023)