Author of the publication

Detecting Anomalies in Process Control Networks.

, and . Critical Infrastructure Protection, volume 311 of IFIP Advances in Information and Communication Technology, page 151-165. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Edge computing in the Internet of Things., , , , and . Int. J. Distributed Sens. Networks, (2017)Downlink Scheduling and Resource Allocation for 5G MIMO Multicarrier Systems., and . 5G World Forum, page 174-179. IEEE, (2018)Index Modulation with PAPR and Beamforming for 5G MIMO-OFDM., and . 5G World Forum, page 389-394. IEEE, (2018)A Secure Protocol for Ubiquitous Sensing and Monitoring of Patient Conditions., and . IJNGC, (2010)Cost-Effective Security Support in Real-Time Video Surveillance., , , , and . IEEE Trans. Ind. Informatics, 11 (6): 1457-1465 (2015)Dynamic localization control for mobile sensor networks., , , and . IPCCC, page 587-592. IEEE, (2005)An Approach for Real-Time Database Modeling and Performance Management., and . IEEE Real-Time and Embedded Technology and Applications Symposium, page 326-336. IEEE Computer Society, (2007)Adaptive Data Replication for Load Sharing in a Sensor Data Center., and . ICDCS Workshops, page 20-25. IEEE Computer Society, (2009)Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems., and . RTCSA, page 183-189. IEEE Computer Society, (2006)Deadline Assignment and Tardiness Control for Real-Time Data Services., and . ECRTS, page 100-109. IEEE Computer Society, (2010)