Author of the publication

Evaluating the readiness of cyber first responders responsible for critical infrastructure protection.

, , , , and . Int. J. Crit. Infrastructure Prot., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing the security of aircraft surveillance in the next generation air traffic control system., , , and . Int. J. Crit. Infrastructure Prot., 6 (1): 3-11 (2013)An analysis of the legality of government-mandated computer inoculations., , , and . Int. J. Crit. Infrastructure Prot., 3 (1): 5-15 (2010)Password Cracking Using Sony Playstations., , and . IFIP Int. Conf. Digital Forensics, volume 306 of IFIP Advances in Information and Communication Technology, page 215-227. Springer, (2009)ADS-B encryption: confidentiality in the friendly skies., , and . CSIIRW, page 9. ACM, (2013)A Taxonomy of Attacks on the DNP3 Protocol., , , and . Critical Infrastructure Protection, volume 311 of IFIP Advances in Information and Communication Technology, page 67-81. Springer, (2009)Providing Situational Awareness for Pipeline Control Operations., , , , and . Critical Infrastructure Protection, volume 311 of IFIP Advances in Information and Communication Technology, page 97-111. Springer, (2009)Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection., , , and . Critical Infrastructure Protection, volume 441 of IFIP Advances in Information and Communication Technology, page 245-261. Springer, (2014)Exploiting the critical infrastructure via nontraditional system inputs., , , and . CSIIRW, page 57. ACM, (2011)Security Analysis of the MPLS Label Distribution Protocol., , , and . Critical Infrastructure Protection, volume 342 of IFIP Advances in Information and Communication Technology, page 127-139. Springer, (2010)Using timing-based side channels for anomaly detection in industrial control systems., , , , and . Int. J. Crit. Infrastructure Prot., (2016)