Author of the publication

A Cyber Security Analysis Methodology for Evaluating Automobile Risk Exposures.

, , and . Critical Infrastructure Protection, volume 686 of IFIP Advances in Information and Communication Technology, page 195-220. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security analysis of an advanced metering infrastructure., , and . Int. J. Crit. Infrastructure Prot., (2017)Wind farm security: attack surface, targets, scenarios and mitigation., , and . Int. J. Crit. Infrastructure Prot., (2017)A Cyber Security Analysis Methodology for Evaluating Automobile Risk Exposures., , and . Critical Infrastructure Protection, volume 686 of IFIP Advances in Information and Communication Technology, page 195-220. Springer, (2023)Leveling the Playing Field: Equipping Ukrainian Freedom Fighters with Low-Cost Drone Detection Capabilities., and . CyCon, page 287-312. IEEE, (2023)Retrofitting Mobile Devices for Capturing Memory-Resident Malware Based on System Side-Effects., , and . IFIP Int. Conf. Digital Forensics, volume 569 of IFIP Advances in Information and Communication Technology, page 59-72. Springer, (2019)Securing Wireless Coprocessors from Attacks in the Internet of Things., and . Critical Infrastructure Protection, volume 570 of IFIP Advances in Information and Communication Technology, page 159-178. Springer, (2019)Radio frequency identification and tracking of vehicles and drivers by exploiting keyless entry systems., , and . Int. J. Crit. Infrastructure Prot., (March 2023)Categorizing Mobile Device Malware Based on System Side-Effects., , and . IFIP Int. Conf. Digital Forensics, volume 511 of IFIP Advances in Information and Communication Technology, page 203-219. Springer, (2017)