Author of the publication

Attack-Defense Modeling of Material Extrusion Additive Manufacturing Systems.

, , , , , , and . Critical Infrastructure Protection, volume 666 of IFIP Advances in Information and Communication Technology, page 121-153. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A cyber risk scoring system for medical devices., , , and . Int. J. Crit. Infrastructure Prot., (2017)Practical Application Layer Emulation in Industrial Control System Honeypots., , , and . Critical Infrastructure Protection, volume 485 of IFIP Advances in Information and Communication Technology, page 83-98. (2016)Using Deception to Shield Cyberspace Sensors., , and . Critical Infrastructure Protection, volume 367 of IFIP Advances in Information and Communication Technology, page 3-18. Springer, (2011)Categorization of Cyber Training Environments for Industrial Control Systems., , , and . Critical Infrastructure Protection, volume 512 of IFIP Advances in Information and Communication Technology, page 243-271. Springer, (2017)Multi-Controller Exercise Environments for Training Industrial Control System First Responders., , , and . Critical Infrastructure Protection, volume 512 of IFIP Advances in Information and Communication Technology, page 273-294. Springer, (2017)Modeling Control System Failures and Attacks - The Waterloo Campaign to Oil Pipelines., , and . Critical Infrastructure Protection, volume 342 of IFIP Advances in Information and Communication Technology, page 43-62. Springer, (2010)A framework for incorporating insurance in critical infrastructure cyber risk strategies., , , , and . Int. J. Crit. Infrastructure Prot., (2016)Enabling Bluetooth Low Energy auditing through synchronized tracking of multiple connections., , , and . Int. J. Crit. Infrastructure Prot., (2017)Defending Building Automation Systems Using DECOY Networks., , , , and . Critical Infrastructure Protection, volume 512 of IFIP Advances in Information and Communication Technology, page 297-317. Springer, (2017)Attack-Defense Modeling of Material Extrusion Additive Manufacturing Systems., , , , , , and . Critical Infrastructure Protection, volume 666 of IFIP Advances in Information and Communication Technology, page 121-153. Springer, (2022)