From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Modeled Cyber-Physical Systems for Independent Review of Intrusion Detection Systems., и . NCS, том 1055 из Advances in Intelligent Systems and Computing, стр. 116-125. Springer, (2019)A testbed for SCADA control system cybersecurity research and pedagogy., , и . CSIIRW, стр. 27. ACM, (2011)Development & expansion of an industrial control system security laboratory and an international research collaboration., , и . CSIIRW, стр. 18. ACM, (2013)Securing SCADA Applications Using OpenPLC With End-To-End Encryption., , и . ICSS, стр. 1-6. ACM, (2017)Virtualization of Industrial Control System Testbeds for Cybersecurity., , и . ICSS, стр. 10-14. ACM, (2016)Modeling a Midstream Oil Terminal for Cyber Security Risk Evaluation., и . Critical Infrastructure Protection, том 542 из IFIP Advances in Information and Communication Technology, стр. 149-175. Springer, (2018)Privacy Protected ELF for Private Computing on Public Platforms., и . ARES, стр. 452-457. IEEE Computer Society, (2008)Classification of Disturbances and Cyber-Attacks in Power Systems Using Heterogeneous Time-Synchronized Data., , и . IEEE Trans. Ind. Informatics, 11 (3): 650-662 (2015)Study of hardware trojans based security vulnerabilities in cyber physical systems., , , и . ICCE, стр. 1-6. IEEE, (2018)Secure Context Switch for Private Computing on Public Platforms., и . GLOBECOM, стр. 2159-2163. IEEE, (2008)