Author of the publication

From ICS Attacks' Analysis to the S.A.F.E. Approach: Implementation of Filters Based on Behavioral Models and Critical State Distance for ICS Cybersecurity.

, , , and . CSNet, page 1-8. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Process-Aware Model-based Intrusion Detection System on Filtering Approach: Further Investigations., , , and . ICIT, page 310-315. IEEE, (2020)Enforcing Safety under Actuator Injection Attacks through Input Filtering., , , and . ECC, page 1521-1528. IEEE, (2022)Actuator and Sensor Attacks Detection Method based on Attack Reconstruction., , , and . MED, page 736-743. IEEE, (2024)Experts' knowledge renewal and maintenance actions effectiveness in high-mix low-volume industries, using Bayesian approach., , , , and . Cogn. Technol. Work., 18 (1): 193-213 (2016)Aging Attacks against Electro-Mechanical Actuators from Control Signal Manipulation., , , and . ICIT, page 133-138. IEEE, (2020)Temporal Assessment of Malicious Behaviors: Application to Turnout Field Data Monitoring., , , and . ICCAD, page 1-6. IEEE, (2024)Real time reconfiguration of manufacturing systems., , and . SMC (5), page 4266-4271. IEEE, (2004)Cyber Threat Assessment in Monitoring Turnout Railway Systems., , , and . ETFA, page 1-8. IEEE, (2023)From ICS Attacks' Analysis to the S.A.F.E. Approach: Implementation of Filters Based on Behavioral Models and Critical State Distance for ICS Cybersecurity., , , and . CSNet, page 1-8. IEEE, (2018)Safety-Preserving Filters Against Stealthy Sensor and Actuator Attacks., , , and . CDC, page 5097-5104. IEEE, (2023)