Author of the publication

Review on Fuzz Testing for Protocols in Industrial Control Systems.

, and . DSC, page 433-438. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Succinct and practical greedy embedding for geometric routing., , , and . Comput. Commun., (2017)Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers., , , , , and . CoRR, (2019)Summary of Research on Information Security Protection of Smart Grid., and . ICAIS (2), volume 12240 of Lecture Notes in Computer Science, page 365-379. Springer, (2020)Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment., , , , , , , and . IEEE Trans. Ind. Informatics, 15 (7): 4285-4294 (2019)User and Entity Behavior Analysis under Urban Big Data., , , , , and . Trans. Data Sci., 1 (3): 16:1-16:19 (2020)Intelligent Event-Triggered Control Supervised by Mini-Batch Machine Learning and Data Compression Mechanism for T-S Fuzzy NCSs Under DoS Attacks., , , , , and . IEEE Trans. Fuzzy Syst., 32 (3): 804-815 (March 2024)Networked Device Identification: A Survey., , and . DSC, page 543-548. IEEE, (2021)Smart Contract Firewall: Protecting the on-Chain Smart Contract Projects., , , , , , , , and . GLOBECOM, page 5122-5128. IEEE, (2023)An ICN-Oriented Name-Based Routing Scheme., , , , and . ICYCSEE, volume 503 of Communications in Computer and Information Science, page 101-108. Springer, (2015)Greedy Embedding Strategy for Dynamic Graphs Based on Spanning Tree., , , and . ICCCS (1), volume 11063 of Lecture Notes in Computer Science, page 525-530. Springer, (2018)