Author of the publication

wIDS: A Multilayer IDS for Wireless-Based SCADA Systems.

, , , and . ICISS, volume 10717 of Lecture Notes in Computer Science, page 387-404. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Wrapper Feature Selection Algorithm for Anomaly-Based Intrusion Detection Systems., , and . FPS, volume 12637 of Lecture Notes in Computer Science, page 3-19. Springer, (2020)OAuth 2.0-based authentication solution for FPGA-enabled cloud computing., , , , and . UCC Companion, page 13:1-13:6. ACM, (2021)Detecting Spoofing and GPS Jamming in UAVs: Multiclass Approach to Attack Diagnosis., , , , , and . HICSS, page 538-547. ScholarSpace, (2024)Security policy architecture for 5G Networks., , and . NoF, page 37-41. IEEE, (2023)Component Based Methodology for QoS-Aware Network Design., , and . ICSOFT (SE), page 190-197. INSTICC Press, (2007)Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks., , , and . ARES, page 157-166. IEEE Computer Society, (2016)Backbone-based location-aided routing algorithm to reduce control packets of AODV protocol., and . Mobility Conference, page 15. ACM, (2006)SONICS: A Segmentation Method for Integrated ICS and Corporate System., , and . ICISS, volume 11281 of Lecture Notes in Computer Science, page 231-250. Springer, (2018)A New Segmentation Method for Integrated ICS (Short Paper)., , and . PST, page 87-94. IEEE Computer Society, (2017)Explainability-based Metrics to Help Cyber Operators Find and Correct Misclassified Cyberattacks., , , and . SAFE@CoNEXT, page 9-15. (2023)