Author of the publication

Limiting the Impact of Stealthy Attacks on Industrial Control Systems.

, , , , , , , , and . ACM Conference on Computer and Communications Security, page 1092-1105. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for the Evaluation of Intrusion Detection Systems., , and . IEEE Symposium on Security and Privacy, page 63-77. IEEE Computer Society, (2006)SDN and NFV Security: Challenges for Integrated Solutions., , , and . Guide to Security in SDN and NFV, Springer, (2017)A new metric to compare anomaly detection algorithms in cyber-physical systems., and . HotSoS, page 11:1-11:2. ACM, (2019)Semantic middleware for the Internet of Things., , and . IOT, IEEE, (2010)IEC 60870-5-104 Network Characterization of a Large-Scale Operational Power Grid., , , and . IEEE Symposium on Security and Privacy Workshops, page 236-241. IEEE, (2019)Optimal risk management in critical infrastructures against cyber-adversaries., and . CCTA, page 2027-2032. IEEE, (2017)Stealing, Spying, and Abusing: Consequences of Attacks on Internet of Things Devices., , and . IEEE Secur. Priv., 17 (5): 10-21 (2019)Cyber-Physical Security and Privacy Guest editors' introduction., and . IEEE Internet Comput., 20 (5): 6-8 (2016)Integrity Attacks on Real-Time Pricing in Smart Grids: Impact and Countermeasures., , and . IEEE Trans. Smart Grid, 8 (5): 2249-2257 (2017)A Moving Target Defense to Detect Stealthy Attacks in Cyber-Physical Systems., , and . ACC, page 391-396. IEEE, (2019)