Author of the publication

Vulnerability analysis of S7 PLCs: Manipulating the security mechanism.

, , and . Int. J. Crit. Infrastructure Prot., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting packed executables using steganalysis., , , and . EUVIP, page 1-5. IEEE, (2014)OSCIDS: An Ontology based SCADA Intrusion Detection Framework., , and . SECRYPT, page 327-335. SciTePress, (2016)An investigation into the design of high-performance shared buffer architectures based on FPGA technology with embedded memory., and . FPT, page 461-464. IEEE, (2004)N-opcode analysis for android malware classification and categorization., , , and . Cyber Security And Protection Of Digital Services, page 1-7. IEEE, (2016)Low power Gm-boosted differential Colpitts VCO., , , , , and . SoCC, page 247-250. IEEE, (2011)Adaptive Echo Cancellation for Packet-Based Networks., , and . ICT, volume 3124 of Lecture Notes in Computer Science, page 516-525. Springer, (2004)Enhancing Security and Privacy of Next-Generation Edge Computing Technologies., , and . PST, page 1-5. IEEE, (2019)Intelligent Sensor Information System For Public Transport - To Safely Go..., , , , , , , , , and . AVSS, page 533-538. IEEE Computer Society, (2010)EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning., , and . IWSPA@CODASPY, page 65-72. ACM, (2017)Cybersecurity Engineering: Bridging the Security Gaps in Advanced Automotive Systems and ISO/SAE 21434., , , , , , and . VTC2023-Spring, page 1-6. IEEE, (2023)