| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
IEEE Access
|
| 2024 | C | conf |
CRITIS
|
| 2024 | — | conf |
Critical Infrastructure Protection
|
| 2024 | C | conf |
CRITIS
|
| 2024 | — | conf |
Critical Infrastructure Protection
|
| 2024 | C | conf |
CRITIS
|
| 2023 | — | conf |
Critical Infrastructure Protection
|
| 2023 | C | conf |
critis
|
| 2022 | J | jnl |
Int. J. Crit. Infrastructure Prot.
|
| 2021 | J | jnl |
Int. J. Crit. Infrastructure Prot.
|
| 2020 | — | conf |
DRCN
|
| 2020 | — | conf |
Wirtschaftsinformatik (Community Tracks)
|
| 2020 | — | conf |
CyCon
|
| 2020 | — | conf |
CNS
|
| 2020 | Misc | conf |
ICNC
|
| 2019 | — | conf |
ECC
|
| 2019 | — | ch. |
Security and Privacy Trends in the Industrial Internet of Thing
|
| 2019 | C | conf |
ACC
|
| 2019 | J | jnl |
Future Internet
|
| 2018 | C | conf |
ICOST
|
| 2018 | — | ch. |
Smart Micro-Grid Systems Security and Privacy
|
| 2018 | — | ch. |
Smart Micro-Grid Systems Security and Privacy
|
| 2018 | C | conf |
ICOST
|
| 2018 | C | conf |
CRITIS
|
| 2018 | — | conf |
ICNSC
|
| 2018 | — | conf |
Critical Infrastructure Protection
|
| 2018 | C | conf |
CRITIS
|
| 2018 | — | conf |
ISGT Europe
|
| 2018 | — | ch. |
Smart Micro-Grid Systems Security and Privacy
|
| 2018 | — | ch. |
Smart Micro-Grid Systems Security and Privacy
|
| 2018 | — | conf |
AINA Workshops
|
| 2018 | — | conf |
AINA Workshops
|
| 2018 | — | book |
|
| 2018 | — | conf |
ISGT Europe
|
| 2018 | — | ch. |
Smart Micro-Grid Systems Security and Privacy
|
| 2017 | B | conf |
AINA
|
| 2017 | C | ed. |
CRITIS
|
| 2017 | C | conf |
CRITIS
|
| 2017 | — | conf |
CASE
|
| 2017 | — | conf |
ISGT Europe
|
| 2017 | J | jnl |
IEEE Trans. Smart Grid
|
| 2017 | — | conf |
ICMCIS
|
| 2017 | Misc | conf |
CISIS
|
| 2017 | — | conf |
MMM-ACNS
|
| 2017 | J | jnl |
J. Inf. Secur. Appl.
|
| 2017 | — | conf |
EUSPN/ICTH
|
| 2016 | — | conf |
CyberICPS@ESORICS
|
| 2016 | C | conf |
Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol.
CRITIS
|
| 2016 | — | conf |
HPCC/SmartCity/DSS
|
| 2016 | C | ed. |
CRITIS
|
| 2016 | — | conf |
CyberICPS@ESORICS
|
| 2016 | — | conf |
FNSS
|
| 2016 | C | conf |
ICISSP
|
| 2016 | — | conf |
SSCI
|
| 2016 | — | conf |
AINA Workshops
|
| 2016 | B | conf |
ICNP
|
| 2016 | — | conf |
Critical Infrastructure Protection
|
| 2016 | — | conf |
CyberICPS@ESORICS
|
| 2016 | J | jnl |
J. Netw. Comput. Appl.
|
| 2016 | C | conf |
CRITIS
|
| 2016 | — | conf |
AINA Workshops
|
| 2016 | C | conf |
CRITIS
|
| 2016 | — | conf |
SSIC
|
| 2015 | C | conf |
CRITIS
|
| 2015 | — | conf |
SmartGridComm
|
| 2015 | — | conf |
MILCOM
|
| 2015 | C | conf |
ISCC
|
| 2015 | C | conf |
CRiSIS
|
| 2015 | — | conf |
DRCN
|
| 2015 | C | conf |
CRITIS
|
| 2015 | — | conf |
ISGT Asia
|
| 2015 | — | conf |
FNSS
|
| 2015 | — | conf |
GIIS
|
| 2015 | — | conf |
AINA Workshops
|
| 2015 | J | jnl |
CoRR
|
| 2014 | — | conf |
ISGT
|
| 2014 | C | conf |
CRITIS
|
| 2014 | — | conf |
Critical Infrastructure Protection
|
| 2014 | — | conf |
Communications and Multimedia Security
|
| 2014 | — | conf |
ISGT
|
| 2014 | — | conf |
Communications and Multimedia Security
|
| 2014 | — | conf |
SOSE
|
| 2014 | — | conf |
CISR
|
| 2014 | C | conf |
CRITIS
|
| 2014 | — | conf |
Critical Infrastructure Protection
|
| 2013 | — | conf |
ISSA
|
| 2013 | B | conf |
NSS
|
| 2013 | — | conf |
NSW
|
| 2013 | C | ed. |
CRITIS
|
| 2013 | — | conf |
ISSA
|
| 2013 | J | jnl |
Int. J. Crit. Infrastructures
|
| 2013 | — | conf |
e-Energy
|
| 2013 | C | conf |
ISC
|
| 2013 | — | conf |
CGC
|
| 2013 | C | conf |
CRITIS
|
| 2012 | — | conf |
ISSA
|
| 2012 | — | conf |
Critical Infrastructure Protection
|
| 2012 | C | conf |
CRITIS
|
| 2012 | J | jnl |
Int. J. Commun. Networks Distributed Syst.
|
| 2012 | — | book |
Critical Infrastructure Protection
|
| 2012 | — | conf |
ICITST
|
| 2012 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2012 | — | ch. |
Critical Infrastructure Protection
|
| 2012 | — | ch. |
Critical Infrastructure Protection
|
| 2012 | B | conf |
ARES
|
| 2011 | — | conf |
Critical Infrastructure Protection
|
| 2011 | B | conf |
NSS
|
| 2011 | C | ed. |
CRITIS
|
| 2011 | C | conf |
CRITIS
|
| 2011 | — | conf |
SADFE
|
| 2011 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2010 | C | conf |
CRITIS
|
| 2010 | C | conf |
ISCC
|
| 2010 | — | conf |
ISSA
|
| 2010 | — | conf |
MobiSec
|
| 2010 | — | conf |
Critical Infrastructure Protection
|
| 2010 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2010 | C | conf |
ISPEC
|
| 2010 | — | conf |
Critical Infrastructure Protection
|
| 2010 | — | conf |
e-Forensics
|
| 2010 | — | conf |
Communications and Multimedia Security
|
| 2010 | B | conf |
ARES
|
| 2010 | — | conf |
IIH-MSP
|
| 2010 | — | conf |
ISSA
|
| 2009 | — | conf |
ICIAR
|
| 2009 | — | conf |
ICDF2C
|
| 2009 | — | conf |
World Conference on Information Security Education
|
| 2009 | J | jnl |
Comput. Secur.
|
| 2009 | — | conf |
IIH-MSP
|
| 2009 | — | conf |
ISSA
|
| 2009 | — | conf |
IIH-MSP
|
| 2009 | — | conf |
IMF
|
| 2009 | — | conf |
IMF
|
| 2009 | — | conf |
ICB
|
| 2009 | C | conf |
CRITIS
|
| 2009 | — | conf |
Critical Infrastructure Protection
|
| 2008 | — | conf |
Network Attack Detection and Defense
|
| 2008 | J | jnl |
Comput. Secur.
|
| 2008 | J | jnl |
Comput. Secur.
|
| 2008 | J | jnl |
Comput. Secur.
|
| 2008 | J | jnl |
Comput. Secur.
|
| 2008 | — | conf |
Critical Infrastructure Protection
|
| 2008 | — | conf |
IMF
|
| 2008 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2008 | A | conf |
ESORICS
|
| 2008 | — | conf |
IMF
|
| 2008 | — | conf |
IIH-MSP
|
| 2007 | C | conf |
CRITIS
|
| 2007 | C | conf |
CRITIS
|
| 2007 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2007 | — | conf |
AIMS
|
| 2007 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2007 | C | conf |
CIS
|
| 2007 | — | conf |
Critical Infrastructure Protection
|
| 2007 | — | conf |
World Conference on Information Security Education
|
| 2007 | J | jnl |
Datenschutz und Datensicherheit
|
| 2006 | — | conf |
InfoSecCD
|
| 2006 | — | conf |
IWIA
|
| 2006 | J | jnl |
Datenschutz und Datensicherheit
|
| 2006 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2005 | C | conf |
CW
|
| 2005 | — | conf |
GI Jahrestagung (1)
|
| 2005 | — | conf |
IWIA
|
| 2004 | — | ed. |
IWIA
|
| 2003 | — | conf |
IAW
|
| 2003 | — | — |
|
| 2003 | A | conf |
ACSAC
|
| 2003 | — | ed. |
IWIA
|
| 2003 | — | book |
Techniques and Applications of Digital Watermarking and Content Protection.
|
| 2002 | J | jnl |
ACM SIGOPS Oper. Syst. Rev.
|
| 2002 | — | conf |
Security and Watermarking of Multimedia Contents
|
| 2001 | A | conf |
ACSAC
|
| 2001 | C | conf |
MMSP
|
| 2001 | — | conf |
Communications and Multimedia Security
|
| 1999 | J | jnl |
IEEE Computer Graphics and Applications
|