Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coastal Infrastructure Monitoring through Heterogeneous Autonomous Vehicles., , , , and . IRC, page 79-82. IEEE, (2020)Cyber-Physical Topology Language: Definition, Operations, and Application., , and . PRDC, page 60-69. IEEE Computer Society, (2015)XUTools: Unix Commands for Processing Next-Generation Structured Text., and . LISA, page 83-99. USENIX Association, (2012)Toward a cyber-physical topology language: applications to NERC CIP audit., , , , and . SEGS@CCS, page 93-104. ACM, (2013)Simulating Energy and Security Interactions in Semiconductor Manufacturing: Insights from the Intel Minifab Model., , , , , , and . WSC, page 3477-3488. IEEE, (2022)F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids., , , , and . DSN, page 407-418. IEEE Computer Society, (2016)PCA-Based Method for Detecting Integrity Attacks on Advanced Metering Infrastructure., , and . QEST, volume 9259 of Lecture Notes in Computer Science, page 70-85. Springer, (2015)Security-Policy Analysis with eXtended Unix Tools.. Dartmouth College, USA, (2013)Scientific Data Management for Interconnected Critical Infrastructure Systems.. JCDL, page 192-201. IEEE, (2021)Using Hierarchical Change Mining to Manage Network Security Policy Evolution., , , , and . Hot-ICE, USENIX Association, (2011)