Author of the publication

Vulnerability and security risk assessment in a IIoT environment in compliance with standard IEC 62443.

, , , , , and . FNC/MobiSPC, volume 191 of Procedia Computer Science, page 33-40. Elsevier, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scientific Discovery Based on Belief Revision., and . J. Symb. Log., 62 (4): 1352-1370 (1997)Synthèse architecturale d'applications temps réel pour technologies submicroniques., , and . Technique et Science Informatiques, 23 (1): 35-66 (2004)Low Power Synthesis Methodology with Data Format Optimization Applied on a DWT., , and . VLSI Signal Processing, 35 (2): 195-211 (2003)Architectural Synthesis with Interconnection Cost Control., , and . VLSI, volume 162 of IFIP Conference Proceedings, page 509-520. Kluwer, (1999)A design methodology for IP integration., , and . ISCAS (4), page 711-714. IEEE, (2002)Autonomous capture of a tumbling satellite., , , , , and . J. Field Robotics, 24 (4): 275-296 (2007)On ordinal VC-dimension and some notions of complexity., , and . Theor. Comput. Sci., 364 (1): 62-76 (2006)Identifying Clusters from Positive Data, , , , and . Electron. Colloquium Comput. Complex., (2004)SoftExplorer: Estimation, Characterization, and Optimization of the Power and Energy Consumption at the Algorithmic Level., , , and . PATMOS, volume 3254 of Lecture Notes in Computer Science, page 342-351. Springer, (2004)Design of a flexible 2-D discrete wavelet transform IP core for JPEG2000 image coding in embedded imaging systems., , and . Signal Process., 86 (7): 1375-1399 (2006)