Sandra König

Orcid: 0000-0003-2881-4519

According to our database1, Sandra König authored at least 43 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Learning minimal automata with recurrent neural networks.
Softw. Syst. Model., June, 2024

Metricizing the Euclidean Space Toward Desired Distance Relations in Point Clouds.
IEEE Trans. Inf. Forensics Secur., 2024

Protection of critical infrastructures from advanced combined cyber and physical threats: The PRAETORIAN approach.
Int. J. Crit. Infrastructure Prot., 2024

Hacking the Least Trusted Node: Indirect Eavesdropping in Quantum Networks.
IEEE Access, 2024

2023
Game-theoretic APT defense: An experimental study on robotics.
Comput. Secur., September, 2023

Attribute Repair for Threat Prevention.
Proceedings of the Computer Safety, Reliability, and Security, 2023

A Systematic Approach to Automotive Security.
Proceedings of the Formal Methods - 25th International Symposium, 2023

PRAETORIAN: A Framework for the Protection of Critical Infrastructures from advanced Combined Cyber and Physical Threats.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Identification and Evaluation of Cyber-Physical Threats on Interdependent Critical Infrastructures.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Games over Probability Distributions Revisited: New Equilibrium Models and Refinements.
Games, 2022

Metricizing the Euclidean Space towards Desired Distance Relations in Point Clouds.
CoRR, 2022

Threat Repair with Optimization Modulo Theories.
CoRR, 2022

Decisions with Uncertain Consequences - A Total Ordering on Loss-Distributions.
CoRR, 2022

Defending Against Advanced Persistent Threats using Game-Theory.
CoRR, 2022

Supervised Machine Learning with Plausible Deniability.
Comput. Secur., 2022

Constrained Training of Recurrent Neural Networks for Automata Learning.
Proceedings of the Software Engineering and Formal Methods - 20th International Conference, 2022

Synchronization in Security Games.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022

Parametrization of Probabilistic Risk Models.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Simulation-driven Risk Model for Interdependent Critical Infrastructures.
Proceedings of the 18th International Conference on Information Systems for Crisis Response and Management, 2021

Asset Driven ISO/SAE 21434 Compliant Automotive Cybersecurity Analysis with ThreatGet.
Proceedings of the Systems, Software and Services Process Improvement, 2021

Multi-categorical Risk Assessment for Urban Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2021

2020
Analyzing Disaster-Induced Cascading Effects in Hybrid Critical Infrastructures: A Practical Approach.
Proceedings of the Guide to Disaster-Resilient Communication Networks, 2020

Understanding Complex Attacks on a Maritime Port.
ERCIM News, 2020

Cross-Domain Risk Analysis to Strengthen City Resilience: the ODYSSEUS Approach.
Proceedings of the 17th International Conference on Information Systems for Crisis Response and Management, 2020

Security Games over Lexicographic Orders.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Cyber-Security in Critical Infrastructures - A Game-Theoretic Approach
Springer, ISBN: 978-3-030-46907-8, 2020

2019
Cascading Threats in Critical Infrastructures with Control Systems.
Proceedings of the 16th International Conference on Information Systems for Crisis Response and Management, 2019

Choosing Ways to Increase Resilience in Critical Infrastructures.
Proceedings of the 16th International Conference on Information Systems for Crisis Response and Management, 2019

Cut-The-Rope: A Game of Stealthy Intrusion.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Estimating Cascading Effects in Cyber-Physical Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2019

2018
Security from the Adversary's Inertia-Controlling Convergence Speed When Playing Mixed Strategy Equilibria.
Games, 2018

Risk Assessment Uncertainties in Cybersecurity Investments.
Games, 2018

Password Security as a Game of Entropies.
Entropy, 2018

Analyzing Cascading Effects among Critical Infrastructures.
Proceedings of the 15th International Conference on Information Systems for Crisis Response and Management, 2018

Disappointment-Aversion in Security Games.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

A Measure for Resilience of Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2018

A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Uncertainty in Cyber Security Investments.
CoRR, 2017

On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

2016
Error Propagation Through a Network With Non-Uniform Failure.
CoRR, 2016

Modelling security risk in critical utilities: The system at risk as a three player game and agent society.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous Networks.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

2015
Uncertainty in Games: Using Probability-Distributions as Payoffs.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015


  Loading...