Author of the publication

Traffic-Locality-Based Creation of Flow Whitelists for SCADA Networks.

, , , and . Critical Infrastructure Protection, volume 466 of IFIP Advances in Information and Communication Technology, page 87-102. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic Attack Sequence Generation and Execution Based on MITRE ATT&CK for ICS Datasets., , and . CSET @ USENIX Security Symposium, page 41-48. ACM, (2021)Co-occurrence Based Security Event Analysis and Visualization for Cyber Physical Systems., , , , and . HCI (40), volume 1226 of Communications in Computer and Information Science, page 540-548. Springer, (2020)POSTER: CPS Security Testbed Development Using Controller-in-the-Middle., , , , and . AsiaCCS, page 829-831. ACM, (2018)Usable Security Management for Network Access Rules of Critical Infrastructure., , , , and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 432-447. Springer, (2017)Multivariate Statistic Approach to Field Specifications of Binary Protocols in SCADA System., , , and . WISA, volume 8909 of Lecture Notes in Computer Science, page 345-357. Springer, (2014)Data-Driven Field Mapping of Security Logs for Integrated Monitoring., , , , and . Critical Infrastructure Protection, volume 570 of IFIP Advances in Information and Communication Technology, page 253-268. Springer, (2019)Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques., , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2020)Passive Fingerprinting of SCADA in Critical Infrastructure Network without Deep Packet Inspection., , , and . CoRR, (2016)One Step More: Automatic ICS Protocol Field Analysis., , , and . CRITIS, volume 10707 of Lecture Notes in Computer Science, page 241-252. Springer, (2017)Vendor-Independent Monitoring on Programmable Logic Controller Status for ICS Security Log Management., , , , , and . AsiaCCS, page 682-684. ACM, (2019)