Author of the publication

Detecting stealthy attacks against industrial control systems based on residual skewness analysis.

, , , , , and . EURASIP J. Wireless Comm. and Networking, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Value Management to Real Estate Project Planning., , and . ICEE, page 2664-2667. IEEE Computer Society, (2010)A machine learning correction for DFT non-covalent interactions based on the S22, S66 and X40 benchmark databases., , , , , , , , and . J. Cheminformatics, 8 (1): 24:1-24:17 (2016)Application of flipped classroom based on the Rain Classroom in the teaching of computer-aided landscape design., , , , and . Comput. Appl. Eng. Educ., 28 (2): 357-366 (2020)Design of experiment course "Computer-aided landscape design" based on flipped classroom., , , and . Comput. Appl. Eng. Educ., 24 (2): 234-240 (2016)Automatic subarachnoid space segmentation and hemorrhage detection in clinical head CT scans., , , , , and . Int. J. Comput. Assist. Radiol. Surg., 7 (4): 507-516 (2012)Kalman filter for the state estimation of a 2-AXLE railway vehicle., , and . ECC, page 2431-2435. IEEE, (1999)TechWatchTool: Innovation and Trend Monitoring., , and . RANLP, page 660-665. RANLP 2011 Organising Committee, (2011)Minimally Supervised Rule Learning for the Extraction of Biographic Information from Various Social Domains., , and . RANLP, page 17-24. RANLP 2011 Organising Committee, (2011)Experimental study of surface roughness on abrasive belt grinding.. EMEIT, page 3010-3013. IEEE, (2011)FIUD: A Framework to Identify Users of Devices., , , and . WASA (2), volume 12938 of Lecture Notes in Computer Science, page 45-57. Springer, (2021)