Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improvements on Ethernet LAN Network Infrastructure for Industrial Automation: a Case Study., and . ETFA, page 16-22. IEEE, (2006)A model for security management of SCADA systems., , and . ETFA, page 448-451. IEEE, (2008)An Effective TCP/IP Fingerprinting Technique Based on Strange Attractors Classification., , and . DPM/SETOP, volume 5939 of Lecture Notes in Computer Science, page 208-221. Springer, (2009)A Qualitative Survey of Active TCP/IP Fingerprinting Tools and Techniques for Operating Systems Identification., , and . CISIS, volume 6694 of Lecture Notes in Computer Science, page 68-75. Springer, (2011)Security Aspects of SCADA and Corporate Network Interconnection: An Overview., and . DepCoS-RELCOMEX, page 127-134. IEEE Computer Society, (2006)Application of Kohonen Maps to Improve Security Tests on Automation Devices., , , and . CRITIS, volume 5141 of Lecture Notes in Computer Science, page 235-245. Springer, (2007)Using a packet manipulation tool for security analysis of industrial network protocols., , , and . ETFA, page 744-747. IEEE, (2007)Advances in network topology security visualisation., , , and . Int. J. Syst. Syst. Eng., 1 (4): 387-400 (2009)Learning Remote Computer Fingerprinting., , , and . Computational Intelligence in Digital Forensics, volume 555 of Studies in Computational Intelligence, Springer, (2014)A New Method for Recognizing Operating Systems of Automation Devices., , and . ETFA, page 1-4. IEEE, (2009)