logo
ArticlesAbout
Register | Login
Research Article
JUCS - Journal of Universal Computer Science 24(5): 556-576
https://doi.org/10.3217/jucs-024-05-0556 (28 May 2018)
Other versions:
XML
PDF
 
 
Twitter
Facebook
Mendeley
Reddit
Notify a colleague
  • Article InfoArticle Info
  • CiteCite
  • MetricsMetrics
  • CommentComment
  • RelatedRelated
  • CitedCited
JUCS - Journal of Universal Computer Science 24(5): 556-576
doi: 10.3217/jucs-024-05-0556
Received: 23 Jan 2018 | Approved: 28 Apr 2018 | Published: 28 May 2018
This article is part of:
JUCS - Journal of Universal Computer Science 24(5): Technical and Social Aspects of Critical Infrastructure Security
Authors
Ralf Keidel - Corresponding author
Worms University of Applied Sciences, Worms, Germany
Articles by this author in:  CrossRef  |  Google Scholar
   
   
   
Steffen Wendzel
https://www.wendzel.de
Articles by this author in:  CrossRef  |  Google Scholar
Sebastian Zillien
Worms University of Applied Sciences, Worms, Germany
Articles by this author in:  CrossRef  |  Google Scholar
Eric S. Conner
Worms University of Applied Sciences, Worms, Germany
Articles by this author in:  CrossRef  |  Google Scholar
Georg Haas
Worms University of Applied Sciences, Worms, Germany
Articles by this author in:  CrossRef  |  Google Scholar
Conflict of interest
The authors have declared that no competing interests exist.
This article is freely available under the J.UCS Open Content License.
Powered by

This website uses cookies in order to improve your web experience. Read our Cookies Policy

OK