Author of the publication

Using timing-based side channels for anomaly detection in industrial control systems.

, , , , and . Int. J. Crit. Infrastructure Prot., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Application Layer Emulation in Industrial Control System Honeypots., , , and . Critical Infrastructure Protection, volume 485 of IFIP Advances in Information and Communication Technology, page 83-98. (2016)Exploitation of HART Wired Signal Distinct Native Attribute (WS-DNA) Features to Verify Field Device Identity and Infer Operating State., , and . CRITIS, volume 8985 of Lecture Notes in Computer Science, page 24-30. Springer, (2014)Firmware modification attacks on programmable logic controllers., , , and . Int. J. Crit. Infrastructure Prot., 6 (2): 76-84 (2013)An Accuracy-Maximization Approach for Claims Classifiers in Document Content Analytics for Cybersecurity., , , , and . J. Cybersecur. Priv., 2 (2): 418-443 (June 2022)CyBERT: Cybersecurity Claim Classification by Fine-Tuning the BERT Language Model., , , , and . J. Cybersecur. Priv., 1 (4): 615-637 (November 2021)A framework for incorporating insurance in critical infrastructure cyber risk strategies., , , , and . Int. J. Crit. Infrastructure Prot., (2016)JTAG-based PLC memory acquisition framework for industrial control systems., , , and . Digit. Investig., (2021)Engineering Mission Assurance for the Cyber Security of Supervisory Control and Data Aquisition (SCADA) Systems., , and . Security and Management, page 555-564. CSREA Press, (2010)Quantifying Controller Resilience Using Behavior Characterization., , and . Critical Infrastructure Protection, volume 390 of IFIP Advances in Information and Communication Technology, page 71-83. Springer, (2012)A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control., , and . SEC, volume 455 of IFIP Advances in Information and Communication Technology, page 204-217. Springer, (2015)