default search action
Björn Leander
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Björn Leander, Bjarne Johansson, Saad Mubeen, Mohammad Ashjaei, Tomas Lindström:
Redundancy Link Security Analysis: An Automation Industry Perspective. ETFA 2024: 1-8 - 2023
- [j2]Tijana Markovic, Miguel Leon, Björn Leander, Sasikumar Punnekkat:
A Modular Ice Cream Factory Dataset on Anomalies in Sensors to Support Machine Learning Research in Manufacturing Systems. IEEE Access 11: 29744-29758 (2023) - [c13]Björn Leander, Aida Causevic, Hans Hansson, Tomas Lindström:
Evaluation of an OPC UA-Based Access Control Enforcement Architecture. ESORICS Workshops (1) 2023: 124-144 - [c12]Björn Leander, Bjarne Johansson, Tomas Lindström, Olof Holmgren, Thomas Nolte, Alessandro V. Papadopoulos:
Dependability and Security Aspects of Network-Centric Control. ETFA 2023: 1-8 - [c11]Björn Leander, Aida Causevic, Tomas Lindström, Hans Hansson:
Access Control Enforcement Architectures for Dynamic Manufacturing Systems. ICSA 2023: 82-92 - [c10]Björn Leander, Tijana Markovic, Miguel Leon:
Enhanced Simulation Environment to Support Research in Modular Manufacturing Systems. IECON 2023: 1-6 - [c9]Selma Opacin, Lejla Rizvanovic, Björn Leander, Saad Mubeen, Aida Causevic:
Developing and Evaluating MQTT Connectivity for an Industrial Controller. MECO 2023: 1-5 - [c8]Ivan Radonjic, Enna Basic, Björn Leander, Tijana Markovic:
An Authorization Service supporting Dynamic Access Control in Manufacturing Systems. WF-IoT 2023: 1-6 - 2022
- [c7]Björn Leander, Tijana Markovic, Aida Causevic, Tomas Lindström, Hans Hansson, Sasikumar Punnekkat:
Simulation Environment for Modular Automation Systems. IECON 2022: 1-6 - [c6]Van-Lan Dao, Björn Leander:
Anomaly Attack Detection in Wireless Networks Using DCNN. WF-IoT 2022: 1-6 - [d1]Tijana Markovic, Miguel Leon, Björn Leander, Sasikumar Punnekkat:
MIDAS: A Modular Ice Cream Factory Dataset on Anomalies in Sensors. IEEE DataPort, 2022 - 2021
- [j1]Björn Leander, Aida Causevic, Hans Hansson, Tomas Lindström:
Toward an Ideal Access Control Strategy for Industry 4.0 Manufacturing Systems. IEEE Access 9: 114037-114050 (2021) - [c5]Björn Leander, Aida Causevic, Tomas Lindström, Hans Hansson:
A Questionnaire Study on the Use of Access Control in Industrial Systems. ETFA 2021: 1-8 - 2020
- [c4]Björn Leander, Aida Causevic, Hans Hansson, Tomas Lindström:
Access Control for Smart Manufacturing Systems. ECSA Companion 2020: 463-476
2010 – 2019
- 2019
- [c3]Björn Leander, Aida Causevic, Hans Hansson:
Applicability of the IEC 62443 standard in Industry 4.0 / IIoT. ARES 2019: 101:1-101:8 - [c2]Björn Leander, Aida Causevic, Hans Hansson:
Cybersecurity Challenges in Large Industrial IoT Systems. ETFA 2019: 1035-1042 - [c1]Bjarne Johansson, Björn Leander, Aida Causevic, Alessandro Vittorio Papadopoulos, Thomas Nolte:
Classification of PROFINET I/O Configurations utilizing Neural Networks. ETFA 2019: 1321-1324
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint