Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware Accelerators., , , and . IEEE Internet Things J., 10 (24): 22143-22152 (December 2023)Embedding Encryption and Machine Learning Intrusion Prevention Systems on Programmable Logic Controllers., , and . IEEE Embed. Syst. Lett., 10 (3): 99-102 (2018)Using Modeled Cyber-Physical Systems for Independent Review of Intrusion Detection Systems., and . NCS, volume 1055 of Advances in Intelligent Systems and Computing, page 116-125. Springer, (2019)Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information., , , , , and . IEEE Trans. Smart Grid, 4 (1): 235-244 (2013)A testbed for SCADA control system cybersecurity research and pedagogy., , and . CSIIRW, page 27. ACM, (2011)Applying Non-Nested Generalized Exemplars Classification for Cyber-Power Event and Intrusion Detection., , and . IEEE Trans. Smart Grid, 9 (5): 3928-3941 (2018)Exploiting DRAM Latency Variations for Generating True Random Numbers., , , , and . CoRR, (2018)The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research., , , , , , , , , and 1 other author(s). CoRR, (2017)Model-based autonomic security management for cyber-physical infrastructures., , , , and . Int. J. Crit. Infrastructures, 12 (4): 273-294 (2016)Modeling a Midstream Oil Terminal for Cyber Security Risk Evaluation., and . Critical Infrastructure Protection, volume 542 of IFIP Advances in Information and Communication Technology, page 149-175. Springer, (2018)