Author of the publication

Man-in-the-middle attacks and defence in a power system cyber-physical testbed.

, , , , , , and . IET Cyper-Phys. Syst.: Theory & Appl., 6 (3): 164-177 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and evaluation of a cyber-physical testbed for improving attack resilience of power systems., , , , , , and . IET Cyper-Phys. Syst.: Theory & Appl., 6 (4): 208-227 (2021)Cellular IoT for Mobile Autonomous Reporting in the Smart Grid., and . Int. J. Interdiscip. Telecommun. Netw., 8 (3): 50-65 (2016)In-Vehicle Emergency Call Services: eCall and Beyond., and . IEEE Commun. Mag., 55 (1): 159-165 (2017)Comparing reproduced cyber experimentation studies across different emulation testbeds., , , , , , , , , and . CSET @ USENIX Security Symposium, page 63-71. ACM, (2021)Modeling AMI network for real-time simulation in NS-3., , and . IPTComm, page 1-8. IEEE, (2016)Computer architecture course database: implementation and status report., , , and . WCAE@ISCA, page 28. ACM, (1998)Man-in-The-Middle Attacks and Defense in a Power System Cyber-Physical Testbed., , , , , , and . CoRR, (2021)Multi-Source Multi-Domain Data Fusion for Cyberattack Detection in Power Systems., , , , , , and . IEEE Access, (2021)BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning., , , and . Int. J. Inf. Sec., 22 (4): 893-917 (2023)Experiments with SIP over TLS in an NG-9-1-1 testbed., , , and . IPTComm, page 7:1-7:3. ACM, (2011)