Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Universality of Christ. G.H. Doran, New York, NY, (1922)CyberSAGE: The cyber security argument graph evaluation tool., , , , , , , and . Empir. Softw. Eng., 28 (1): 18 (2023)Data-driven evaluation of building demand response capacity., , , and . SmartGridComm, page 541-547. IEEE, (2014)The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment., , , , , , , and . GraMSec@CSF, volume 9987 of Lecture Notes in Computer Science, page 39-61. Springer, (2016)Monotonic marginal pricing: demand response with price certainty., and . SIGMETRICS Perform. Evaluation Rev., 41 (3): 65-70 (2013)Incorporating Radiomics into Machine Learning Models to Predict Outcomes of Neuroblastoma., , , , , , , and . J. Digit. Imaging, 35 (3): 605-612 (2022)Developing Models for Physical Attacks in Cyber-Physical Systems., , , , , and . CPS-SPC@CCS, page 49-55. ACM, (2017)Systems-Theoretic Likelihood and Severity Analysis for Safety and Security Co-engineering., , , and . RSSRail, volume 10598 of Lecture Notes in Computer Science, page 51-67. Springer, (2017)Reconciling Systems-Theoretic and Component-Centric Methods for Safety and Security Co-analysis., , , and . SAFECOMP Workshops, volume 10489 of Lecture Notes in Computer Science, page 87-93. Springer, (2017)Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems., , , , , and . PRDC, page 125-134. IEEE, (2018)