Author of the publication

From ICS Attacks' Analysis to the S.A.F.E. Approach: Implementation of Filters Based on Behavioral Models and Critical State Distance for ICS Cybersecurity.

, , , and . CSNet, page 1-8. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enforcing Safety under Actuator Injection Attacks through Input Filtering., , , and . ECC, page 1521-1528. IEEE, (2022)Process-Aware Model-based Intrusion Detection System on Filtering Approach: Further Investigations., , , and . ICIT, page 310-315. IEEE, (2020)Process-Aware Model based IDSs for Industrial Control Systems Cybersecurity: Approaches, Limits and Further Research., , and . ETFA, page 605-612. IEEE, (2018)Safety monitoring under stealthy sensor injection attacks using reachable sets., , , and . CoRR, (2023)Enforcing Safety under Actuator Attacks through Input Filtering., , , and . CoRR, (2021)Aging Attacks against Electro-Mechanical Actuators from Control Signal Manipulation., , , and . ICIT, page 133-138. IEEE, (2020)From ICS Attacks' Analysis to the S.A.F.E. Approach: Implementation of Filters Based on Behavioral Models and Critical State Distance for ICS Cybersecurity., , , and . CSNet, page 1-8. IEEE, (2018)Safety-Preserving Filters Against Stealthy Sensor and Actuator Attacks., , , and . CDC, page 5097-5104. IEEE, (2023)Cyber Threat Assessment in Monitoring Turnout Railway Systems., , , and . ETFA, page 1-8. IEEE, (2023)