Alexander Giehl
Orcid: 0000-0001-7648-3895
According to our database1,
Alexander Giehl
authored at least 14 papers
between 2018 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Evaluation of Risks and Security Controls for Industrial Components within Connected Manufacturing.
PhD thesis, 2024
MINERVA: Secure Collaborative Machine Tool Data Utilization Leveraging Confidentiality-Protecting Technologies.
Proceedings of the Open Identity Summit 2024, Porto, Portugal, June 20-21, 2024, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Proceedings of the Computer Safety, Reliability, and Security, 2023
2021
The Stream Exchange Protocol: A Secure and Lightweight Tool for Decentralized Connection Establishment.
Sensors, 2021
Leveraging Edge Computing and Differential Privacy to Securely Enable Industrial Cloud Collaboration Along the Value Chain.
Proceedings of the 17th IEEE International Conference on Automation Science and Engineering, 2021
2020
Proceedings of the 16th IEEE International Conference on Automation Science and Engineering, 2020
AntiPatterns regarding the application of cryptographic primitives by the example of ransomware.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Proceedings of the 2019 11th International Conference on Computer and Automation Engineering, 2019
MERCAT: A Metric for the Evaluation and Reconsideration of Certificate Authority Trustworthiness.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019
2018
Proceedings of the International Conference on Signal Processing and Information Security, 2018
Proceedings of the 12th International Conference on Sensing Technology, 2018
Proceedings of the 2018 10th International Conference on Computer and Automation Engineering, 2018
Realistic Data Generation for Anomaly Detection in Industrial Settings Using Simulations.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018