Alexander Giehl

Orcid: 0000-0001-7648-3895

According to our database1, Alexander Giehl authored at least 11 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
From Standard to Practice: Towards ISA/IEC 62443-Conform Public Key Infrastructures.
Proceedings of the Computer Safety, Reliability, and Security, 2023

2021
The Stream Exchange Protocol: A Secure and Lightweight Tool for Decentralized Connection Establishment.
Sensors, 2021

Leveraging Edge Computing and Differential Privacy to Securely Enable Industrial Cloud Collaboration Along the Value Chain.
Proceedings of the 17th IEEE International Conference on Automation Science and Engineering, 2021

2020
Integrating security evaluations into virtual commissioning.
Proceedings of the 16th IEEE International Conference on Automation Science and Engineering, 2020

AntiPatterns regarding the application of cryptographic primitives by the example of ransomware.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
A framework to assess impacts of cyber attacks in manufacturing.
Proceedings of the 2019 11th International Conference on Computer and Automation Engineering, 2019

MERCAT: A Metric for the Evaluation and Reconsideration of Certificate Authority Trustworthiness.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

2018
Implementing a performant security control for Industrial Ethernet.
Proceedings of the International Conference on Signal Processing and Information Security, 2018

Future Proofing IoT Embedded Platforms for Cryptographic Primitives Support.
Proceedings of the 12th International Conference on Sensing Technology, 2018

Security Verification of Third Party Design Files in Manufacturing.
Proceedings of the 2018 10th International Conference on Computer and Automation Engineering, 2018

Realistic Data Generation for Anomaly Detection in Industrial Settings Using Simulations.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018


  Loading...