Author of the publication

Process Discovery for Industrial Control System Cyber Attack Detection.

, , , and . SEC, volume 502 of IFIP Advances in Information and Communication Technology, page 61-75. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Implementation of the Yao Forward Integrity Protocol for Mobile Agents., , and . Cryptographic Algorithms and their Uses, page 110-124. Queensland University of Technology, (2004)Towards Secure and Legal E-Tendering., , , , , , , and . J. Inf. Technol. Constr., (2006)An Improved Forward Integrity Protocol for Mobile Agents., , , and . WISA, volume 2908 of Lecture Notes in Computer Science, page 272-285. Springer, (2003)Linkability in Practical Electronic Cash Design., , , , and . ISW, volume 1975 of Lecture Notes in Computer Science, page 149-163. Springer, (2000)Ubiquitous Authorization Scheme Based on Device Profile., , and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 312-321. Springer, (2006)Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy., , and . AISC, volume 161 of CRPIT, page 67-70. Australian Computer Society, (2015)Machine Learning to Optimize TCP Communications Over High Frequency Communications Links., , , and . IEEE Access, (2022)Analysis of two authorization protocols using Colored Petri Nets., , , and . Int. J. Inf. Sec., 14 (3): 221-247 (2015)Authentication strategies in vehicular communications: a taxonomy and framework., , , , and . EURASIP J. Wirel. Commun. Netw., 2021 (1): 129 (2021)Denial-of-service resistance in key establishment., , , , and . Int. J. Wirel. Mob. Comput., 2 (1): 59-71 (2007)