Data confidentiality using fragmentation in cloud computing A Hudic, S Islam, P Kieseberg, S Rennert, ER Weippl International Journal of Pervasive Computing and Communications 9 (1), 37-51, 2013 | 68 | 2013 |
Security viewpoint in a reference architecture model for cyber-physical production systems Z Ma, A Hudic, A Shaaban, S Plosz 2017 IEEE European symposium on security and privacy workshops (EuroS&PW …, 2017 | 52 | 2017 |
Model based process to support security and privacy requirements engineering S Islam, H Mouratidis, C Kalloniatis, A Hudic, L Zechner International Journal of Secure Software Engineering (IJSSE) 3 (3), 1-22, 2012 | 41 | 2012 |
Security assurance assessment methodology for hybrid clouds A Hudic, P Smith, ER Weippl Computers & Security 70, 723-743, 2017 | 37 | 2017 |
Impact of critical infrastructure requirements on service migration guidelines to the cloud C Wagner, A Hudic, S Maksuti, M Tauber, F Pallas 2015 3rd International Conference on Future Internet of Things and Cloud, 1-8, 2015 | 16 | 2015 |
Towards a unified penetration testing taxonomy A Hudic, L Zechner, S Islam, C Krieg, ER Weippl, S Winkler, R Hable 2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012 | 15 | 2012 |
Harmonized monitoring for high assurance clouds A Bicaku, S Balaban, MG Tauber, A Hudic, A Mauthe, D Hutchison 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW …, 2016 | 14 | 2016 |
A multi-layer and multitenant cloud assurance evaluation methodology A Hudic, M Tauber, T Lorünser, M Krotsiani, G Spanoudakis, A Mauthe, ... 2014 IEEE 6th International Conference on Cloud Computing Technology and …, 2014 | 12 | 2014 |
Towards continuous cloud service assurance for critical infrastructure it A Hudic, T Hecht, M Tauber, A Mauthe, SC Elvira 2014 International Conference on Future Internet of Things and Cloud, 175-182, 2014 | 12 | 2014 |
Categorization of standards, guidelines and tools for secure system design for critical infrastructure it in the cloud S Paudel, M Tauber, C Wagner, A Hudic, WK Ng 2014 IEEE 6th International Conference on Cloud Computing Technology and …, 2014 | 7 | 2014 |
Towards a unified secure cloud service development and deployment life-cycle A Hudic, M Flittner, T Lorünser, PM Radl, R Bless 2016 11th International Conference on Availability, Reliability and Security …, 2016 | 6 | 2016 |
Towards resilience metrics for future cloud applications M Novak, SN Shirazi, A Hudic, T Hecht, M Tauber, D Hutchison, S Maksuti, ... 6th International Conference on Cloud Computing and Services Science, Rome …, 2016 | 6 | 2016 |
Private cloud computing: Consolidation, virtualization, and service-oriented infrastructure MS Kunze, S Fritsch | 6 | 2012 |
Automated analysis of underground marketplaces A Hudic, K Krombholz, T Otterbein, C Platzer, E Weippl Advances in Digital Forensics X: 10th IFIP WG 11.9 International Conference …, 2014 | 5 | 2014 |
Eine Architektur für sichere Smart Grids in Österreich O Jung, S Fenz, M Kammerstetter, A Hudic DA-CH Security 2016, 1-9, 2016 | 1 | 2016 |
A generation method of cryptographic keys for enterprise communication systems A Hudic, E Revell, DE Simos 2013 International Conference on Availability, Reliability and Security, 406-411, 2013 | 1 | 2013 |
Security assurance assessment for multi-layered and multi-tenant hybrid clouds A Hudic Technische Universität Wien, 2017 | | 2017 |
Lorün ser A Hudic, M Tauber T., Krotsiani, M., Spanoudakis, G., Mauthe, A. & Weippl, E, 2014 | | 2014 |
A Custom-classification of Communication Flow in a Client-server Model A Hudic, E Revell, AB Kelisec, DE Simos | | |
Eine Architektur f ur sichere Smart Grids inOsterreich O Jung, S Fenz, M Kammerstetter, A Hudic | | |