Author of the publication

Intrusion Detection with Data Correlation Relation Graph.

, and . ARES, page 982-989. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System., , , , and . CCTA, page 1692-1697. IEEE, (2018)Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems., , , , and . CNS, page 1-9. IEEE, (2018)Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems., , , , and . EAI Endorsed Trans. Security Safety, 8 (28): e5 (2021)RAPID: Traffic-agnostic intrusion detection for resource-constrained wireless mesh networks., , , and . Comput. Secur., (2014)Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System., , , , and . SecureComm (2), volume 305 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 146-160. Springer, (2019)Security and Privacy Considerations for Machine Learning Models Deployed in the Government and Public Sector (white paper)., , , , and . CoRR, (2020)A Review of Cybersecurity Incidents in the Water Sector., , , , , , and . CoRR, (2020)FL-WBC: Enhancing Robustness against Model Poisoning Attacks in Federated Learning from a Client Perspective., , , , , and . NeurIPS, page 12613-12624. (2021)Towards effective security control assignment in the Industrial Internet of Things., , and . WF-IoT, page 795-800. IEEE Computer Society, (2015)Efficient flooding in Wireless Sensor Networks secured with neighborhood keys., , and . WiMob, page 119-126. IEEE Computer Society, (2011)