Author of the publication

You Can't Protect What You Don't Understand: Characterizing an Operational Gas SCADA Network.

, , , , , and . SP (Workshops), page 243-250. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Full Abstractness of a Metric Semantics for Action Refinement., , and . Fundam. Informaticae, 40 (4): 335-382 (1999)Principles on the Security of AES against First and Second-Order Differential Power Analysis., , and . ACNS, volume 6123 of Lecture Notes in Computer Science, page 168-185. (2010)Data Governance and Transparency for Collaborative Systems., , and . DBSec, volume 9766 of Lecture Notes in Computer Science, page 199-216. Springer, (2016)Verifying Probabilistic Programs Using a Hoare like Logic.. ASIAN, volume 1742 of Lecture Notes in Computer Science, page 113-125. Springer, (1999)Comparative Metric Semantics for Commit in OR-Parallel Logic Programming., , and . ILPS, page 101-115. MIT Press, (1997)A white-box anomaly-based framework for database leakage detection., , , , and . J. Inf. Secur. Appl., (2017)SAFAX - An Extensible Authorization Service for Cloud Environments., , , and . Frontiers ICT, (2015)Automated Cyber Threat Intelligence Generation on Multi-Host Network Incidents., , , and . IEEE Big Data, page 2999-3008. IEEE, (2023)Functional Principles of Registry-based Service Discovery., , , , and . LCN, page 209-217. IEEE Computer Society, (2005)Evaluation Framework for Network Intrusion Detection Systems for In-Vehicle CAN., , , and . ICCVE, page 1-6. IEEE, (2019)