Author of the publication

Corrigendum to "Development of the ECAT Preprocessor with the Trust Communication Approach".

, and . Secur. Commun. Networks, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development of the ECAT Preprocessor with the Trust Communication Approach., and . Secur. Commun. Networks, (2018)Building an interconnection between PROFIBUS and ATM networks., and . J. Netw. Comput. Appl., 30 (2): 800-817 (2007)Integration of a speech activated control system and a wireless interworking unit for a CAN-based distributed application., , , , and . J. Netw. Comput. Appl., 32 (6): 1210-1218 (2009)CENTER Water: A Secure Testbed Infrastructure Proposal For Waste and Potable Water Management., , , , and . ISDFS, page 1-7. IEEE, (2021)MITRE ICS Attack Simulation and Detection on EtherCAT Based Drinking Water System., , and . ISDFS, page 1-6. IEEE, (2021)A priority-based queuing model approach using destination parameters forreal-time applications on IPv6 networks., and . Turkish J. Electr. Eng. Comput. Sci., 28 (2): 727-742 (2020)Methodology to Determine the Device-Level Periodicity for Anomaly Detection in EtherCAT-Based Industrial Control Network., and . IEEE Trans. Netw. Serv. Manag., 18 (2): 2308-2319 (2021)An Ontology Based Approach for Data Leakage Prevention Against Advanced Persistent Threats., , and . MTSR, volume 1057 of Communications in Computer and Information Science, page 115-125. Springer, (2019)Performance Analysis of a CAN/ATM LAN Bridge Under Various Loads., , , and . JCIS, page 314-318. JCIS / Association for Intelligent Machinery, Inc., (2002)A CAN/IEEE 802.11b wireless Lan local bridge design., , , and . Comput. Stand. Interfaces, 30 (3): 200-212 (2008)