Real-time calculus for scheduling hard real-time systems L Thiele, S Chakraborty, M Naedele 2000 IEEE International Symposium on Circuits and Systems (ISCAS) 4, 101-104, 2000 | 845 | 2000 |
Security for industrial communication systems D Dzung, M Naedele, TP Von Hoff, M Crevatin Proceedings of the IEEE 93 (6), 1152-1177, 2005 | 554 | 2005 |
SCADA systems: Challenges for forensic investigators I Ahmed, S Obermeier, M Naedele, G Richard III IEEE Computer 45 (12), 42-49, 2012 | 167 | 2012 |
Standards for XML and Web services security M Naedele Computer 36 (4), 96-98, 2003 | 157 | 2003 |
Security for process control systems: An overview M Braendle, M Naedele Security & Privacy, IEEE 6 (6), 24-29, 2008 | 86 | 2008 |
Manufacturing execution systems: A vision for managing software development M Naedele, HM Chen, R Kazman, Y Cai, L Xiao, CVA Silva Journal of systems and Software 101, 59-68, 2015 | 77 | 2015 |
Addressing IT security for critical control systems M Naedele 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 72 | 2007 |
Augmented reality for improved service delivery M Aleksy, E Vartiainen, V Domova, M Naedele 2014 IEEE 28th International Conference on Advanced Information Networking …, 2014 | 42 | 2014 |
Network security for substation automation systems M Naedele, D Dzung, M Stanimirov Computer Safety, Reliability and Security (Safecomp 2001), 25-34, 2001 | 38 | 2001 |
Design patterns in Petri net system modeling M Naedele, JW Janneck Proceedings. Fourth IEEE International Conference on Engineering of Complex …, 1998 | 36 | 1998 |
IT Security for Automation Systems–Motivations and Mechanisms M Naedele atp international 1 (1), 2003 | 35* | 2003 |
Experiences applying automated architecture analysis tool suites R Mo, W Snipes, Y Cai, S Ramaswamy, R Kazman, M Naedele Proceedings of the 33rd ACM/IEEE International Conference on Automated …, 2018 | 33 | 2018 |
Standardizing industrial IT security-a first look at the IEC approach M Naedele 2005 IEEE Conference on Emerging Technologies and Factory Automation 2, 7 pp …, 2005 | 31 | 2005 |
ACCESS CONTROL PROTOCOL FOR EMBEDDED DEVICES M Naedele US Patent App. 20,090/022,325, 2008 | 30 | 2008 |
Fault-tolerant real-time scheduling under execution time constraints M Naedele Proceedings Sixth International Conference on Real-Time Computing Systems …, 1999 | 30 | 1999 |
System and method for suppressing redundant alarms M Naedele, C Frei, P Sager, A Fay US Patent 8,314,694, 2012 | 28 | 2012 |
Protection of an electric power transmission network C Rehtanz, M Naedele, J Bertsch US Patent App. 20,040/090,725, 2003 | 27 | 2003 |
IT Security for Automation Systems–Motivations and Mechanisms M Naedele Automatisierungstechnische Praxis 45 (5), 84-91, 2003 | 27 | 2003 |
IT Security for Automation Systems - Motivations and Mechanisms M Naedele Workshop Sicherheit und Verfuegbarkeit in der Echtzeit- und …, 2002 | 27 | 2002 |
Modeling a die bonder with Petri nets: a case study JW Janneck, M Naedele IEEE Transactions on semiconductor manufacturing 11 (3), 404-409, 1998 | 26 | 1998 |