Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the cyber security of SCADA communication networks., , and . Commun. ACM, 52 (7): 139-142 (2009)Research issues in robot safety.. ICRA, page 1854-1855. IEEE Computer Society, (1988)Security Enhancements for Distributed Control Systems., , and . Critical Infrastructure Protection, volume 253 of IFIP, page 133-146. Springer, (2007)Linguistic decision schemata for intelligent robots., and . Autom., 20 (1): 121-126 (1984)A security-hardened appliance for implementing authentication and access control in SCADA infrastructures with legacy field devices., , and . Int. J. Crit. Infrastructure Prot., 6 (1): 12-24 (2013)A note on determining the measure of coincidence of segments of a given conic., and . Comput. Aided Des., 3 (3): 16-17 (1971)Comment on äutomatic planning of manipulator transfer movements".. IEEE Trans. Syst. Man Cybern., 14 (3): 499-500 (1984)Book Review.. Artif. Intell. Rev., 9 (6): 423 (1995)Active Learning Mashups for Tablet Classrooms., and . CATA, page 60-65. ISCA, (2011)Anomaly-Based Intrusion Monitoring Using a Dynamic Honeypot., and . CATA, page 184-189. ISCA, (2005)