From post

From Power to Water: Dissecting SCADA Networks Across Different Critical Infrastructures.

, , , , и . PAM (1), том 14537 из Lecture Notes in Computer Science, стр. 3-31. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Comparative Metric Semantics for Commit in OR-Parallel Logic Programming., , и . ILPS, стр. 101-115. MIT Press, (1997)Full Abstractness of a Metric Semantics for Action Refinement., , и . Fundam. Informaticae, 40 (4): 335-382 (1999)Verifying Probabilistic Programs Using a Hoare like Logic.. ASIAN, том 1742 из Lecture Notes in Computer Science, стр. 113-125. Springer, (1999)Data Governance and Transparency for Collaborative Systems., , и . DBSec, том 9766 из Lecture Notes in Computer Science, стр. 199-216. Springer, (2016)Principles on the Security of AES against First and Second-Order Differential Power Analysis., , и . ACNS, том 6123 из Lecture Notes in Computer Science, стр. 168-185. (2010)A white-box anomaly-based framework for database leakage detection., , , , и . J. Inf. Secur. Appl., (2017)SAFAX - An Extensible Authorization Service for Cloud Environments., , , и . Frontiers ICT, (2015)Automated Cyber Threat Intelligence Generation on Multi-Host Network Incidents., , , и . IEEE Big Data, стр. 2999-3008. IEEE, (2023)Functional Principles of Registry-based Service Discovery., , , , и . LCN, стр. 209-217. IEEE Computer Society, (2005)Evaluation Framework for Network Intrusion Detection Systems for In-Vehicle CAN., , , и . ICCVE, стр. 1-6. IEEE, (2019)