From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attacking SCADA systems: A practical perspective., , , , и . IM, стр. 741-746. IEEE, (2017)Improving network security monitoring for industrial control systems., , , , , , и . IM, стр. 878-881. IEEE, (2015)Stealthy Deception Attacks Against SCADA Systems., , , , , и . CyberICPS/SECPRE@ESORICS, том 10683 из Lecture Notes in Computer Science, стр. 93-109. Springer, (2017)My Smart Home is Under Attack., , , , и . CSE, стр. 145-151. IEEE Computer Society, (2015)MICIE: An Alerting Framework for Interdependent Critical Infrastructures., , , , , , и . ServiceWave, том 6481 из Lecture Notes in Computer Science, стр. 207-208. Springer, (2010)Discrete Event Simulation of QoS of a SCADA System Interconnecting a Power Grid and a Telco Network., , , , , и . HCC, том 328 из IFIP Advances in Information and Communication Technology, стр. 350-362. Springer, (2010)Cloudifying Critical Applications: A Use Case from the Power Grid Domain., , , , , , , и . PDP, стр. 363-370. IEEE Computer Society, (2017)Improving Resilience of Interdependent Critical Infrastructures via an On-Line Alerting System., , , , , , , , , и 14 other автор(ы). COMPENG, стр. 88-90. IEEE Computer Society, (2010)A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems., , , , , , , и . IEEE Trans. Ind. Informatics, 12 (6): 2236-2246 (2016)