Author of the publication

Softwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection.

, , , , and . NOF, page 102-109. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experimental Evaluation of Floating Car Data Collection Protocols in Vehicular Networks., , and . VTC Fall, page 1-6. IEEE, (2019)Smartphones in a Microwave: Formal and Experimental Feasibility Study on Fingerprinting the Corona-Warn-App., , and . ARES, page 151:1-151:7. ACM, (2023)WLAN Device Fingerprinting using Channel State Information (CSI)., , , , and . WISEC, page 277-278. ACM, (2018)Work in Progress: Can Johnny Encrypt E-Mails on Smartphones?, and . STAST, volume 13176 of Lecture Notes in Computer Science, page 182-193. Springer, (2021)Softwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection., , , , and . NOF, page 102-109. IEEE, (2019)Poster: Performance Evaluation of an Open-Source Audio-Video Bridging/Time-Sensitive Networking Testbed for Automotive Ethernet., , , , , , and . VNC, page 1-2. IEEE, (2018)Locust: Highly Concurrent DHT Experimentation Framework for Security Evaluations., , , and . ICCNS, page 115-122. ACM, (2020)Tracking Without Traces - Fingerprinting in an Era of Individualism and Complexity., , and . APF, volume 12121 of Lecture Notes in Computer Science, page 201-212. Springer, (2020)Integrated protection of industrial control systems from cyber-attacks: the ATENA approach., , , , , , , , , and 8 other author(s). Int. J. Crit. Infrastructure Prot., (2018)Towards an Empirical Study to Determine the Effectiveness of Support Systems against E-Mail Phishing Attacks., , and . CHI Extended Abstracts, page 288:1-288:15. ACM, (2023)