Author of the publication

A Digital Forensic Taxonomy For Programmable Logic Controller Data Artefacts.

, , , and . EuroS&P Workshops, page 320-328. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart Cyber-Physical Systems: Beyond Usable Security to Security Ergonomics by Design., and . SEsCPS@ICSE, page 22-25. IEEE, (2017)Modularisation and composition of aspectual requirements., , and . AOSD, page 11-20. ACM, (2003)SADES - a Semi-Autonomous Database Evolution System.. ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, page 24-25. Springer, (1998)Early Aspects: Are There Any Other Kind?. EA@AOSD, volume 4765 of Lecture Notes in Computer Science, page 195-198. Springer, (2007)Understanding security requirements for industrial control system supply chains., , and . SEsCPS@ICSE, page 50-53. IEEE / ACM, (2019)On the Impact of Evolving Requirements-Architecture Dependencies: An Exploratory Study., , , and . CAiSE, volume 5074 of Lecture Notes in Computer Science, page 243-257. Springer, (2008)Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds., , , and . CPS-SPC@CCS, page 75-86. ACM, (2019)CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy., and . ACM Conference on Computer and Communications Security, page 2171-2172. ACM, (2018)Who Am I? Analyzing Digital Personas in Cybercrime Investigations., , , , , and . Computer, 46 (4): 54-61 (2013)Automating the mutation testing of aspect-oriented Java programs., , , and . AST, page 51-58. ACM, (2010)