Author of the publication

TACAN: transmitter authentication through covert channels in controller area networks.

, , , and . ICCPS, page 23-34. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting integrity attacks in IoT-based Cyber Physical Systems: a case study on Hydra testbed., , , , and . CoRR, (2019)Covert Channels-Based Stealth Attacks in Industry 4.0., , , , and . IEEE Syst. J., 13 (4): 3980-3988 (2019)Covert Channel-Based Transmitter Authentication in Controller Area Networks., , , , and . CoRR, (2019)AMON: an Automaton MONitor for Industrial Cyber-Physical Security., , and . ARES, page 33:1-33:10. ACM, (2019)Augmenting white cane reliability using smart glove for visually impaired people., , and . EMBC, page 8046-8049. IEEE, (2015)Taking Control: Design and Implementation of Botnets for Cyber-Physical Attacks with CPSBot., , and . CoRR, (2018)Network Anomaly Detection in Critical Infrastructure Based on Mininet Network Simulator., , and . ITASEC, volume 1816 of CEUR Workshop Proceedings, page 116-125. CEUR-WS.org, (2017)Detecting ADS-B Spoofing Attacks Using Deep Neural Networks., , , , , and . CNS, page 187-195. IEEE, (2019)A testbed for integrated fault diagnosis and cyber security investigation, , , and . Control, Decision and Information Technologies (CoDIT), 2016 International Conference on, page 454--459. IEEE, (2016)Improving Security in Industrial Internet of Things: A Distributed Intrusion Detection Methodology., and . Security and Privacy Trends in the Industrial Internet of Thing, Springer, (2019)