Author of the publication

Structured whitelist generation in SCADA network using PrefixSpan algorithm.

, , , , and . APNOMS, page 326. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

POSTER: CPS Security Testbed Development Using Controller-in-the-Middle., , , , and . AsiaCCS, page 829-831. ACM, (2018)Structured whitelist generation in SCADA network using PrefixSpan algorithm., , , , and . APNOMS, page 326. IEEE, (2017)Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances., , , , and . RAID, volume 11050 of Lecture Notes in Computer Science, page 577-599. Springer, (2018)A Comparison of ICS Datasets for Security Research Based on Attack Paths., , and . CRITIS, volume 11260 of Lecture Notes in Computer Science, page 154-166. Springer, (2018)Generating Abnormal Industrial Control Network Traffic for Intrusion Detection System Testing., , , , , and . Critical Infrastructure Protection, volume 542 of IFIP Advances in Information and Communication Technology, page 265-281. Springer, (2018)One Step More: Automatic ICS Protocol Field Analysis., , , and . CRITIS, volume 10707 of Lecture Notes in Computer Science, page 241-252. Springer, (2017)Data Visualization for Network Access Rules of Critical Infrastructure., , , , and . HCI (3), volume 10273 of Lecture Notes in Computer Science, page 35-54. Springer, (2017)