Author of the publication

Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set.

, , , and . CoRR, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security in Process: Detecting Attacks in Industrial Process Data., , , and . CECC, page 5:1-5:6. ACM, (2019)Security in Process: Visually Supported Triage Analysis in Industrial Process Data., , , , and . CoRR, (2019)ARENA: A Data-Driven Radio Access Networks Analysis of Football Events., , , , , and . IEEE Trans. Netw. Serv. Manag., 17 (4): 2634-2647 (2020)Connectivity in the era of the (I)IoT: about security, features and limiting factors of reconfigurable intelligent surfaces., , , , , , , , and . Discov. Internet Things, 3 (1): 16 (December 2023)Neural Network-Based Channel Prediction and Its Performance in Multi-Antenna Systems., and . VTC Fall, page 1-6. IEEE, (2018)Deep Down the Rabbit Hole: On References in Networks of Decoy Elements., , , , and . CoRR, (2021)Secure (S)Hell: Introducing an SSH Deception Proxy Framework., , , and . CyberSA, page 1-6. IEEE, (2021)Deterministic Planning for Flexible Intralogistics., , , and . ICAC, page 1-6. IEEE, (2021)Secure Federated Learning: An Evaluation of Homomorphic Encrypted Network Traffic Prediction., , , and . CCNC, page 1-6. IEEE, (2023)CPU Resource Resilience in Wireless Mobile Communications: Design and Evaluation on COTS Virtual Distributed Platform., , , , and . BlackSeaCom, page 43-48. IEEE, (2022)