Author of the publication

A Distributed Ledger Approach to Digital Twin Secure Data Sharing.

, , and . DBSec, volume 11559 of Lecture Notes in Computer Science, page 281-300. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distributed Ledger Approach to Digital Twin Secure Data Sharing., , and . DBSec, volume 11559 of Lecture Notes in Computer Science, page 281-300. Springer, (2019)EtherTwin: Blockchain-based Secure Digital Twin Information Management., , , and . Inf. Process. Manag., 58 (1): 102425 (2021)Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity., , , and . J. Cybersecur. Priv., 1 (3): 519-538 (September 2021)Enhancing Industrial Control System Forensics Using Replication-Based Digital Twins., , and . IFIP Int. Conf. Digital Forensics, volume 612 of IFIP Advances in Information and Communication Technology, page 21-38. Springer, (2021)Employing Digital Twins for Security-by-Design System Testing., , , and . SAT-CPS@CODASPY, page 97-106. ACM, (2022)Harnessing Digital Twin Security Simulations for systematic Cyber Threat Intelligence., , and . COMPSAC, page 789-797. IEEE, (2022)Integrating digital twin security simulations in the security operations center., , and . ARES, page 18:1-18:9. ACM, (2020)Digital Twin: Empowering Enterprises Towards a System-of-Systems Approach., and . Bus. Inf. Syst. Eng., 62 (2): 179-184 (2020)Unleashing the Digital Twin's Potential for ICS Security., and . IEEE Secur. Priv., 18 (4): 20-27 (2020)Big Log Data Stream Processing: Adapting an Anomaly Detection Technique., and . DEXA (2), volume 11030 of Lecture Notes in Computer Science, page 159-166. Springer, (2018)