Author of the publication

Using timing-based side channels for anomaly detection in industrial control systems.

, , , , and . Int. J. Crit. Infrastructure Prot., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ADS-B encryption: confidentiality in the friendly skies., , and . CSIIRW, page 9. ACM, (2013)An analysis of the legality of government-mandated computer inoculations., , , and . Int. J. Crit. Infrastructure Prot., 3 (1): 5-15 (2010)Enhancing the security of aircraft surveillance in the next generation air traffic control system., , , and . Int. J. Crit. Infrastructure Prot., 6 (1): 3-11 (2013)Password Cracking Using Sony Playstations., , and . IFIP Int. Conf. Digital Forensics, volume 306 of IFIP Advances in Information and Communication Technology, page 215-227. Springer, (2009)Security Analysis of the MPLS Label Distribution Protocol., , , and . Critical Infrastructure Protection, volume 342 of IFIP Advances in Information and Communication Technology, page 127-139. Springer, (2010)A Taxonomy of Attacks on the DNP3 Protocol., , , and . Critical Infrastructure Protection, volume 311 of IFIP Advances in Information and Communication Technology, page 67-81. Springer, (2009)Providing Situational Awareness for Pipeline Control Operations., , , , and . Critical Infrastructure Protection, volume 311 of IFIP Advances in Information and Communication Technology, page 97-111. Springer, (2009)Exploiting the critical infrastructure via nontraditional system inputs., , , and . CSIIRW, page 57. ACM, (2011)Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection., , , and . Critical Infrastructure Protection, volume 441 of IFIP Advances in Information and Communication Technology, page 245-261. Springer, (2014)Using timing-based side channels for anomaly detection in industrial control systems., , , , and . Int. J. Crit. Infrastructure Prot., (2016)