Folgen
Gerhard Hansch
Gerhard Hansch
AUDI AG
Bestätigte E-Mail-Adresse bei audi.de
Titel
Zitiert von
Zitiert von
Jahr
Deriving Impact-driven Security Requirements and Monitoring Measures for Industrial IoT
G Hansch, P Schneider, GS Brost
Proceedings of the 5th on Cyber-Physical System Security Workshop, 37-45, 2019
192019
A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications
G Hansch, P Schneider, K Fischer, K Böttinger
24th IEEE International Conference on Emerging Technologies and Factory …, 2019
172019
Applicability of Security Standards for Operational Technology by SMEs and Large Enterprises
P Wagner, G Hansch, C Konrad, KH John, J Bauer, J Franke
2020 25th IEEE International Conference on Emerging Technologies and Factory …, 2020
152020
Modeling Security Risk Assessments
D Angermeier, K Beilke, G Hansch, J Eichler
122019
Adaptive Modelling for Security Analysis of Networked Control Systems.
J Wolf, F Wieczorek, F Schiller, G Hansch, N Wiedermann, M Hutle
International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR'16 …, 2016
92016
Packet-wise Compression and Forwarding of Industrial Network Captures
G Hansch, P Schneider, S Plaga
9th IEEE International Conference on Intelligent Data Acquisition and …, 2017
82017
Security Risk Assessments: Modeling and Risk Level Propagation
D Angermeier, H Wester, K Beilke, G Hansch, J Eichler
ACM Transactions on Cyber-Physical Systems 7 (1), 1-25, 2023
72023
D2.2 Threat and Risk Assessment Methodology
M Hutle, G Hansch, W Fitzgerald, T Hecht, E Piatkowska, P Smith
SPARKS – Smart Grid Protection Against Cyber Attacks, 2015
72015
Automating Security Risk and Requirements Management for Cyber-Physical Systems
G Hansch
Georg-August-Universität Göttingen, 2020
52020
Following the White Rabbit: Integrity Verification Based on Risk Analysis Results
C Jakobs, M Werner, K Schmidt, G Hansch
Proceedings of the 5th ACM Computer Science in Cars Symposium, 1-9, 2021
32021
Detecting and Correlating Supranational Threats for Critical Infrastructures
K Böttinger, G Hansch, B Filipovic
European Conference on Cyber Warfare and Security, 34-41, 2016
32016
Heuristic Risk Treatment for ISO/SAE 21434 Development Projects
C Jakobs, M Werner, K Schmidt, G Hansch
2022 17th Conference on Computer Science and Intelligence Systems (FedCSIS …, 2022
12022
Secure your SSH Keys! Motivation and Practical Implementation of a HSM-based Approach Securing Private SSH-Keys
S Plaga, N Wiedermann, G Hansch, T Newe
European Conference on Cyber Warfare and Security, 370-379, 2018
12018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–13