Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Covert Channels-Based Stealth Attacks in Industry 4.0., , , , and . IEEE Syst. J., 13 (4): 3980-3988 (2019)Covert Channel-Based Transmitter Authentication in Controller Area Networks., , , , and . CoRR, (2019)Detecting integrity attacks in IoT-based Cyber Physical Systems: a case study on Hydra testbed., , , , and . CoRR, (2019)AMON: an Automaton MONitor for Industrial Cyber-Physical Security., , and . ARES, page 33:1-33:10. ACM, (2019)A Multiple-Criteria Decision Making method as support for critical infrastructure protection and Intrusion Detection System., , , , , and . IECON, page 4871-4876. IEEE, (2016)Improving Security in Industrial Internet of Things: A Distributed Intrusion Detection Methodology., and . Security and Privacy Trends in the Industrial Internet of Thing, Springer, (2019)A testbed for integrated fault diagnosis and cyber security investigation, , , and . Control, Decision and Information Technologies (CoDIT), 2016 International Conference on, page 454--459. IEEE, (2016)Covert Channel-Based Transmitter Authentication in Controller Area Networks., , , , and . IEEE Trans. Dependable Secur. Comput., 19 (4): 2665-2679 (2022)The Rise of ICS Malware: A Comparative Analysis., , , and . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, volume 13106 of Lecture Notes in Computer Science, page 496-511. Springer, (2021)MimePot: a Model-based Honeypot for Industrial Control Networks., , and . SMC, page 433-438. IEEE, (2019)