Author of the publication

Machine Learning Models for Cyberattack Detection in Industrial Control Systems.

, , and . EIT, page 166-170. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proposals for Configurable Models of Graphics Systems., , and . Comput. Graph. Forum, 3 (3): 201-208 (1984)Cultural Heritage As a Vehicle for Basic Research in Computing Science: Pasteur's Quadrant and a Use-Inspired Basic Research Agenda.. Comput. Graph. Forum, 27 (8): 2188-2196 (2008)Supporting Public Availability and Accessibility with Elvin: Experiences and Reflections., , , , and . Comput. Support. Cooperative Work., 11 (3-4): 447-474 (2002)Web based presentation of semantically tagged 3D content for public sculptures and monuments in the UK., , and . Web3D, page 119-126. ACM, (2009)Computer Graphics and Cultural Heritage, Part 2: Continuing Inspiration for Future Tools.. IEEE Computer Graphics and Applications, 34 (4): 70-79 (2014)Developing Effective Interfaces for Cultural Heritage 3D Immersive Environments., , , , , and . VAST, page 93-99. Eurographics Association, (2007)Science, Technology and Medicine in Colonial India. The New Cambridge History of India Cambridge University Press, Cambridge, (2000)Cholera and Colonialism in British India. Past & Present, (1986)Utilizing Computer Vision Algorithms to Detect and Classify Cyberattacks in IoT Environments in Real-Time., , and . eIT, page 300-303. IEEE, (2023)Experiments in Animation Control by Neural Networks., and . IV, page 252-260. IEEE Computer Society, (1998)