Author of the publication

Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid.

, , , , and . ICS-CSR, BCS, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Application Layer Metrics to Detect Advanced SCADA Attacks., , and . ICISSP, page 418-425. SciTePress, (2018)Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA Networks., and . ICETE (2), page 287-294. ScitePress, (2020)Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations., , , , , , , and . ETFA, page 1-8. IEEE, (2015)Operations-informed incident response playbooks., , , and . Comput. Secur., (November 2023)Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems., , and . J. Cybersecur., (2020)Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction., , and . ICISSP, page 465-472. SciTePress, (2016)Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid., , , , and . ICS-CSR, BCS, (2016)Towards Understanding Man-in-the-middle Attacks on IEC 60870-5-104 SCADA Networks., , and . ICS-CSR, BCS, (2014)Broadband ISDN., , and . Comput. Commun., 11 (4): 185-190 (1988)Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the 'Hacktivist' Threat to Critical Infrastructure., and . CyberSA, page 1-7. IEEE, (2020)