Author of the publication

Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study.

, , , and . UbiSec, volume 1768 of Communications in Computer and Information Science, page 193-206. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Performance Assessment of Free-to-Use Vulnerability Scanners - Revisited., , and . SEC, volume 625 of IFIP Advances in Information and Communication Technology, page 53-65. Springer, (2021)Autotuning and adaptivity in energy efficient HPC systems: the ANTAREX toolbox., , , , , , , , , and 15 other author(s). CF, page 270-275. ACM, (2018)Industrial Data Sharing Ecosystems: An Innovative Value Chain Traceability Platform Based in Data Spaces., , , , , and . WorldCIST (3), volume 987 of Lecture Notes in Networks and Systems, page 423-432. Springer, (2024)ORAT - An Open Redirect Analysis Tool., , and . ISDFS, page 1-5. IEEE, (2024)On Expressing Strategies for Directive-Driven Multicore Programing Models., , , , and . PARMA-DITAM@HiPEAC, page 7-12. ACM, (2014)Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study., , , and . UbiSec, volume 1768 of Communications in Computer and Information Science, page 193-206. Springer, (2022)Autotuning and adaptivity approach for energy efficient Exascale HPC systems: The ANTAREX approach., , , , , , , , , and 6 other author(s). DATE, page 708-713. IEEE, (2016)A Framework for On-Demand Reporting of Cryptocurrency Ownership and Provenance., , and . BLOCKCHAIN, volume 1238 of Advances in Intelligent Systems and Computing, page 131-143. Springer, (2020)Severity Analysis of Web3 Security Vulnerabilities Based on Publicly Bug Reports., , and . BLOCKCHAIN, volume 778 of Lecture Notes in Networks and Systems, page 154-163. Springer, (2023)System Protection Agent Against Unauthorized Activities via USB Devices., , and . IoTBDS, page 237-243. SciTePress, (2018)