Author of the publication

Automatische Evaluierung von Anforderungen bezüglich der Informationssicherheit für das zukünftige industrielle Netzwerkmanagement.

, , and . Echtzeit, page 49-58. Springer Vieweg, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model-based approach for adaptive assembly assistance., , , and . ETFA, page 1-7. IEEE, (2021)Fast and seamless handover for secure mobile industrial applications with 802.11r., , , and . LCN, page 750-757. IEEE Computer Society, (2009)Cloud computing for industrial automation systems - A comprehensive overview., , and . ETFA, page 1-4. IEEE, (2013)Requirements Analysis for the Evaluation of Automated Security Risk Assessments., , , , , and . WFCS, page 1-4. IEEE, (2024)Secure Communication in Factories - Benchmarking Elliptic Curve Diffie-Hellman Key Exchange Implementations on an Embedded System., , and . WFCS, page 1-4. IEEE, (2022)A field level architecture for reconfigurable real-time automation systems., , , and . WFCS, page 1-10. IEEE, (2014)Control-as-a-service from the cloud: A case study for using virtualized PLCs., , , and . WFCS, page 1-4. IEEE, (2014)Evil SteVe: An Approach to Simplify Penetration Testing of OCPP Charge Points., , and . ETFA, page 1-4. IEEE, (2022)Towards an isochronous wireless communication system for industrial automation., , , , and . ETFA, page 1-4. IEEE, (2013)Survey of Security Standards for an automated Industrie 4.0 compatible Manufacturing., , , and . IECON, page 2849-2854. IEEE, (2019)