Deriving Impact-driven Security Requirements and Monitoring Measures for Industrial IoT G Hansch, P Schneider, GS Brost Proceedings of the 5th on Cyber-Physical System Security Workshop, 37-45, 2019 | 19 | 2019 |
A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications G Hansch, P Schneider, K Fischer, K Böttinger 24th IEEE International Conference on Emerging Technologies and Factory …, 2019 | 16 | 2019 |
Applicability of Security Standards for Operational Technology by SMEs and Large Enterprises P Wagner, G Hansch, C Konrad, KH John, J Bauer, J Franke 2020 25th IEEE International Conference on Emerging Technologies and Factory …, 2020 | 14 | 2020 |
Modeling Security Risk Assessments D Angermeier, K Beilke, G Hansch, J Eichler | 11 | 2019 |
Adaptive Modelling for Security Analysis of Networked Control Systems. J Wolf, F Wieczorek, F Schiller, G Hansch, N Wiedermann, M Hutle International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR'16 …, 2016 | 9 | 2016 |
Packet-wise Compression and Forwarding of Industrial Network Captures G Hansch, P Schneider, S Plaga 9th IEEE International Conference on Intelligent Data Acquisition and …, 2017 | 8 | 2017 |
D2.2 Threat and Risk Assessment Methodology M Hutle, G Hansch, W Fitzgerald, T Hecht, E Piatkowska, P Smith SPARKS – Smart Grid Protection Against Cyber Attacks, 2015 | 7 | 2015 |
Security Risk Assessments: Modeling and Risk Level Propagation D Angermeier, H Wester, K Beilke, G Hansch, J Eichler ACM Transactions on Cyber-Physical Systems 7 (1), 1-25, 2023 | 6 | 2023 |
Automating Security Risk and Requirements Management for Cyber-Physical Systems G Hansch Georg-August-Universität Göttingen, 2020 | 5 | 2020 |
Following the White Rabbit: Integrity Verification Based on Risk Analysis Results C Jakobs, M Werner, K Schmidt, G Hansch Proceedings of the 5th ACM Computer Science in Cars Symposium, 1-9, 2021 | 3 | 2021 |
Detecting and Correlating Supranational Threats for Critical Infrastructures K Böttinger, G Hansch, B Filipovic European Conference on Cyber Warfare and Security, 34-41, 2016 | 3 | 2016 |
Heuristic Risk Treatment for ISO/SAE 21434 Development Projects C Jakobs, M Werner, K Schmidt, G Hansch 2022 17th Conference on Computer Science and Intelligence Systems (FedCSIS …, 2022 | 1 | 2022 |
Secure your SSH Keys! Motivation and Practical Implementation of a HSM-based Approach Securing Private SSH-Keys S Plaga, N Wiedermann, G Hansch, T Newe European Conference on Cyber Warfare and Security, 370-379, 2018 | 1 | 2018 |