Author of the publication

Process Discovery for Industrial Control System Cyber Attack Detection.

, , , and . SEC, volume 502 of IFIP Advances in Information and Communication Technology, page 61-75. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modified SIS epidemic model for analysis of virus spread in wireless sensor networks., , and . Int. J. Wirel. Mob. Comput., 6 (2): 99-108 (2013)Selling to the BRIC: Brazil - an awakening tiger.. Learn. Publ., 24 (4): 261-265 (2011)Methods for time-varying exposure related problems in pharmacoepidemiology: An overview., , , , , , , and . Pharmacoepidemiology and drug safety, 27 (2): 148-160 (February 2018)Databases; Marginal structural models; Propensity score.Internet-wide Scanning Taxonomy and Framework., , and . AISC, volume 161 of CRPIT, page 61-65. Australian Computer Society, (2015)Signs, Symbols, Games, and Play.. Games Cult., 1 (1): 47-51 (2006)In search of a minimalist game.. DiGRA Conference, Digital Games Research Association, (2009)High-Level Information Fusion of Cyber-Security Expert Knowledge and Experimental Data., , , and . FUSION, page 2322-2329. IEEE, (2018)Process Discovery for Industrial Control System Cyber Attack Detection., , , and . SEC, volume 502 of IFIP Advances in Information and Communication Technology, page 61-75. Springer, (2017)The Semantic Database Constructor., , and . IEEE Trans. Software Eng., 11 (7): 583-591 (1985)The attack of the backstories (and why they won't win).. DiGRA Conference, (2003)