Author of the publication

Practical Application Layer Emulation in Industrial Control System Honeypots.

, , , and . Critical Infrastructure Protection, volume 485 of IFIP Advances in Information and Communication Technology, page 83-98. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using timing-based side channels for anomaly detection in industrial control systems., , , , and . Int. J. Crit. Infrastructure Prot., (2016)Constructing cost-effective and targetable industrial control system honeypots for production networks., , , , and . Int. J. Crit. Infrastructure Prot., (2015)Kensor: Coordinated Intelligence from Co-Located Sensors., , and . IEEE BigData, page 4169-4174. IEEE, (2019)Automated Reconstruction of Control Logic for Programmable Logic Controller Forensics., , and . ISC, volume 11723 of Lecture Notes in Computer Science, page 402-422. Springer, (2019)Enhancing Critical Infrastructure and Key Resources (CIKR) Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features., , , and . IEEE Trans. Inf. Forensics Secur., 13 (5): 1215-1229 (2018)A framework for incorporating insurance in critical infrastructure cyber risk strategies., , , , and . Int. J. Crit. Infrastructure Prot., (2016)Quantifying Controller Resilience Using Behavior Characterization., , and . Critical Infrastructure Protection, volume 390 of IFIP Advances in Information and Communication Technology, page 71-83. Springer, (2012)A Testbed for Evaluating Performance and Cybersecurity Implications of IEC-61850 GOOSE Hardware Implementations., , , , and . CCNC, page 1-6. IEEE, (2023)Engineering Mission Assurance for the Cyber Security of Supervisory Control and Data Aquisition (SCADA) Systems., , and . Security and Management, page 555-564. CSREA Press, (2010)A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control., , and . SEC, volume 455 of IFIP Advances in Information and Communication Technology, page 204-217. Springer, (2015)