Author of the publication

Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment.

, , , , and . Critical Infrastructure Protection, volume 485 of IFIP Advances in Information and Communication Technology, page 3-25. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An RF-DNA verification process for ZigBee networks., , and . MILCOM, page 1-6. IEEE, (2012)Comparison of High-end and Low-end Receivers for RF-DNA Fingerprinting., , and . MILCOM, page 24-29. IEEE, (2014)Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks., , , and . IPCCC, page 469-474. IEEE Computer Society, (2008)PHY foundation for multi-factor ZigBee node authentication., , and . GLOBECOM, page 795-800. IEEE, (2012)ZigBee Device Verification for Securing Industrial Control and Building Automation Systems., , and . Critical Infrastructure Protection, volume 417 of IFIP Advances in Information and Communication Technology, page 47-62. Springer, (2013)Watching for Weakness in Wild WPANs., , , and . MILCOM, page 1404-1409. IEEE, (2013)Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment., , , , and . Critical Infrastructure Protection, volume 485 of IFIP Advances in Information and Communication Technology, page 3-25. (2016)Comparison of parametric and non-parametric statistical features for Z-Wave fingerprinting., and . MILCOM, page 378-382. IEEE, (2015)Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers., , , , and . Int. J. Crit. Infrastructure Prot., (2015)Rogue Z-Wave controllers: A persistent attack channel., and . LCN Workshops, page 734-741. IEEE Computer Society, (2015)