From post

Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure.

, , , , , и . ACISP (2), том 10343 из Lecture Notes in Computer Science, стр. 452-459. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем