Author of the publication

Analysis of Industrial Device Architectures for Real-Time Operations Under Denial of Service Attacks.

, , , , and . ICICS, volume 12282 of Lecture Notes in Computer Science, page 462-478. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impact of Active Scanning Tools for Device Discovery in Industrial Networks., , , , , and . SpaCCS Workshops, volume 12383 of Lecture Notes in Computer Science, page 557-572. Springer, (2020)Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation., , , , and . Computing Research Repository CoRR, (2019)PropFuzz - An IT-Security Fuzzing Framework for Proprietary ICS Protocols., , and . CoRR, (2019)CoRT: A Communication Robustness Testbed for Industrial Control System Components., , and . CoRR, (2019)A Secure Network Scanner Architecture for Asset Management in Strongly Segmented ICS Networks., , , and . ICISSP, page 347-355. SCITEPRESS, (2021)A Secure Dual-MCU Architecture for Robust Communication of IIoT Devices, , and . Mediterranean Conference on Embedded Computing (MECO); IEEE, (2019)A Secure Dual-MCU Architecture for Robust Communication of IIoT Devices., , and . MECO, page 1-5. IEEE, (2019)Network Scanning and Mapping for IIoT Edge Node Device Security., , , and . Computing Research Repository CoRR, (2019)LICSTER - A Low-cost ICS Security Testbed for Education and Research., , , and . Computing Research Repository CoRR, (2019)Efficient Intrusion Detection on Low-Performance Industrial IoT Edge Node Devices., , , , and . Computing Research Repository CoRR, (2019)