From post

Traffic-Locality-Based Creation of Flow Whitelists for SCADA Networks.

, , , и . Critical Infrastructure Protection, том 466 из IFIP Advances in Information and Communication Technology, стр. 87-102. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Co-occurrence Based Security Event Analysis and Visualization for Cyber Physical Systems., , , , и . HCI (40), том 1226 из Communications in Computer and Information Science, стр. 540-548. Springer, (2020)Obfuscation of Critical Infrastructure Network Traffic Using Fake Communication., , и . CRITIS, том 8985 из Lecture Notes in Computer Science, стр. 268-274. Springer, (2014)Structured whitelist generation in SCADA network using PrefixSpan algorithm., , , , и . APNOMS, стр. 326. IEEE, (2017)Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances., , , , и . RAID, том 11050 из Lecture Notes in Computer Science, стр. 577-599. Springer, (2018)Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural Networks., , и . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, том 11980 из Lecture Notes in Computer Science, стр. 3-18. Springer, (2019)"Do you know existing accuracy metrics overrate time-series anomaly detections?"., , , и . SAC, стр. 403-412. ACM, (2022)Two ICS Security Datasets and Anomaly Detection Contest on the HIL-based Augmented ICS Testbed., , , и . CSET @ USENIX Security Symposium, стр. 36-40. ACM, (2021)Probabilistic Attack Sequence Generation and Execution Based on MITRE ATT&CK for ICS Datasets., , и . CSET @ USENIX Security Symposium, стр. 41-48. ACM, (2021)Refining schizophrenia via graph reachability in Esterel., , , , и . MEMOCODE, стр. 18-27. IEEE, (2009)POSTER: Expanding a Programmable CPS Testbed for Network Attack Analysis., , , и . AsiaCCS, стр. 928-930. ACM, (2020)