Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Design to Invariants: Detecting Attacks on Cyber Physical Systems., and . QRS Companion, page 533-540. IEEE, (2017)EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security., , and . CyberICPS/SECPRE@ESORICS, volume 11387 of Lecture Notes in Computer Science, page 37-52. Springer, (2018)ICS-BlockOpS: Blockchain for operational data security in industrial control system., , and . Pervasive Mob. Comput., (2019)Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study., and . CSDM Asia, volume 426 of Advances in Intelligent Systems and Computing, page 75-94. Springer, (2016)Attacks on smart grid: power supply interruption and malicious power generation., , , and . Int. J. Inf. Sec., 19 (2): 189-211 (2020)Distributed Attack Detection in a Water Treatment Plant: Method and Case Study., and . IEEE Trans. Dependable Secur. Comput., 18 (1): 86-99 (2021)A Digital Forensic Taxonomy For Programmable Logic Controller Data Artefacts., , , and . EuroS&P Workshops, page 320-328. IEEE, (2023)Argus: An Orthogonal Defense Framework to Protect Public Infrastructure against Cyber-Physical Attacks., , and . IEEE Internet Comput., 20 (5): 38-45 (2016)Evaluation of Software Understandability Using Rough Sets., , and . ICACNI, volume 243 of Advances in Intelligent Systems and Computing, page 939-946. Springer, (2013)Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences., , , , and . ASE, page 962-973. IEEE, (2019)