Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security., , and . CyberICPS/SECPRE@ESORICS, volume 11387 of Lecture Notes in Computer Science, page 37-52. Springer, (2018)From Design to Invariants: Detecting Attacks on Cyber Physical Systems., and . QRS Companion, page 533-540. IEEE, (2017)Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study., and . CSDM Asia, volume 426 of Advances in Intelligent Systems and Computing, page 75-94. Springer, (2016)A Digital Forensic Taxonomy For Programmable Logic Controller Data Artefacts., , , and . EuroS&P Workshops, page 320-328. IEEE, (2023)Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences., , , , and . ASE, page 962-973. IEEE, (2019)Investigation of Cyber Attacks on a Water Distribution System., , , and . ACNS Workshops, volume 12418 of Lecture Notes in Computer Science, page 274-291. Springer, (2020)Evaluation of Software Understandability Using Rough Sets., , and . ICACNI, volume 243 of Advances in Intelligent Systems and Computing, page 939-946. Springer, (2013)Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions., and . SG-CRC, volume 14 of Cryptology and Information Security Series, page 59-74. IOS Press, (2016)Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography., , and . IEEE Secur. Priv., 19 (5): 57-65 (2021)Challenges in Secure Engineering of Critical Infrastructure Systems., , and . ASE Workshops, page 61-64. IEEE, (2019)