From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Passive Fingerprinting of SCADA in Critical Infrastructure Network without Deep Packet Inspection., , , и . CoRR, (2016)Obfuscation of Critical Infrastructure Network Traffic Using Fake Communication., , и . CRITIS, том 8985 из Lecture Notes in Computer Science, стр. 268-274. Springer, (2014)Impact Analysis of PLC Performance When Applying Cyber Security Solutions Using Active Information Gathering., , и . CRITIS, том 13139 из Lecture Notes in Computer Science, стр. 133-151. Springer, (2021)A Cost-Optimized Detection System Location Scheme for DDoS Attack., , , , , и . PDCAT, том 3320 из Lecture Notes in Computer Science, стр. 549-553. Springer, (2004)Security Validation for Data Diode with Reverse Channel., , , и . CRITIS, том 10242 из Lecture Notes in Computer Science, стр. 271-282. Springer, (2016)Traffic-Locality-Based Creation of Flow Whitelists for SCADA Networks., , , и . Critical Infrastructure Protection, том 466 из IFIP Advances in Information and Communication Technology, стр. 87-102. Springer, (2015)Packet Loss Consideration for Burst-Based Anomaly Detection in SCADA Network., , , и . WISA, том 8909 из Lecture Notes in Computer Science, стр. 358-369. Springer, (2014)Multivariate Statistic Approach to Field Specifications of Binary Protocols in SCADA System., , , и . WISA, том 8909 из Lecture Notes in Computer Science, стр. 345-357. Springer, (2014)Usable Security Management for Network Access Rules of Critical Infrastructure., , , , и . HCI (22), том 10292 из Lecture Notes in Computer Science, стр. 432-447. Springer, (2017)