Author of the publication

Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks.

, , , and . ARES, page 157-166. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

wIDS: A Multilayer IDS for Wireless-Based SCADA Systems., , , and . ICISS, volume 10717 of Lecture Notes in Computer Science, page 387-404. Springer, (2017)Assessment and enforcement of wireless sensor network-based SCADA systems security. (Évaluation et mise en oeuvre de la sécurité dans les systèmes SCADA à base de réseaux de capteurs sans fil).. École nationale supérieure Mines-Télécom Atlantique Bretagne-Pays de la Loire, France, (2018)Security Analysis of WirelessHART Communication Scheme., , , and . FPS, volume 10128 of Lecture Notes in Computer Science, page 223-238. Springer, (2016)WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks Simulator., , , and . CyberICS/WOS-CPS@ESORICS, volume 9588 of Lecture Notes in Computer Science, page 63-78. Springer, (2015)Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks., , , and . ARES, page 157-166. IEEE Computer Society, (2016)wirelessOrBAC: Towards an access-control-based IDS for Wireless Sensor Networks., , , and . ICCNS, page 96-103. ACM, (2017)Security Issue of WirelessHART Based SCADA Systems., , , and . CRiSIS, volume 9572 of Lecture Notes in Computer Science, page 225-241. Springer, (2015)A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems., , , and . CRiSIS, volume 11391 of Lecture Notes in Computer Science, page 35-40. Springer, (2018)