Author of the publication

Enhancing a Virtual SCADA Laboratory Using Simulink.

, and . Critical Infrastructure Protection, volume 466 of IFIP Advances in Information and Communication Technology, page 119-133. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A testbed for SCADA control system cybersecurity research and pedagogy., , and . CSIIRW, page 27. ACM, (2011)Applying Non-Nested Generalized Exemplars Classification for Cyber-Power Event and Intrusion Detection., , and . IEEE Trans. Smart Grid, 9 (5): 3928-3941 (2018)Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information., , , , , and . IEEE Trans. Smart Grid, 4 (1): 235-244 (2013)Using Modeled Cyber-Physical Systems for Independent Review of Intrusion Detection Systems., and . NCS, volume 1055 of Advances in Intelligent Systems and Computing, page 116-125. Springer, (2019)A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware Accelerators., , , and . IEEE Internet Things J., 10 (24): 22143-22152 (December 2023)Embedding Encryption and Machine Learning Intrusion Prevention Systems on Programmable Logic Controllers., , and . IEEE Embed. Syst. Lett., 10 (3): 99-102 (2018)Exploiting DRAM Latency Variations for Generating True Random Numbers., , , , and . CoRR, (2018)The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research., , , , , , , , , and 1 other author(s). CoRR, (2017)Model-based autonomic security management for cyber-physical infrastructures., , , , and . Int. J. Crit. Infrastructures, 12 (4): 273-294 (2016)Securing SCADA Applications Using OpenPLC With End-To-End Encryption., , and . ICSS, page 1-6. ACM, (2017)