Author of the publication

Using high-level synthesis and formal analysis to predict and preempt attacks on industrial control systems.

, , , and . FPGA, page 209-212. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rapid Precedent-Aware Pedestrian and Car Classification on Constrained IoT Platforms., , , and . ESTIMedia, page 29-36. ACM, (2016)Data-to-music API: Real-time data-agnostic sonification with musical structure models., , and . ICAD, page 244-251. Institute of Electronic Music and Acoustics (IEM), University of Music and Performing Arts Graz (KUG), Austria, (2015)Run-time prediction and preemption of configuration attacks on embedded process controllers., , and . SECURIT, page 135-144. ACM, (2012)Interacting with Hardware Trojans over a network., , and . HOST, page 69-74. IEEE Computer Society, (2012)Establishing Trust in Microelectronics.. FPGA, page 21. ACM, (2020)The Trustworthy Autonomic Interface Guardian Architecture for Cyber-Physical Systems., , , and . CIT/IUCC/DASC/PICom, page 1803-1810. IEEE, (2015)Application-Level Autonomic Hardware to Predict and Preempt Software Attacks on Industrial Control Systems., , , and . DSN, page 136-147. IEEE Computer Society, (2014)Using high-level synthesis and formal analysis to predict and preempt attacks on industrial control systems., , , and . FPGA, page 209-212. ACM, (2014)Thwarting Software Attacks on Data-Intensive Platforms with Configurable Hardware-Assisted Application Rule Enforcement., , and . FPL, page 207-212. IEEE Computer Society, (2011)