Author of the publication

Traffic-Locality-Based Creation of Flow Whitelists for SCADA Networks.

, , , and . Critical Infrastructure Protection, volume 466 of IFIP Advances in Information and Communication Technology, page 87-102. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Obfuscation of Critical Infrastructure Network Traffic Using Fake Communication., , and . CRITIS, volume 8985 of Lecture Notes in Computer Science, page 268-274. Springer, (2014)Structured whitelist generation in SCADA network using PrefixSpan algorithm., , , , and . APNOMS, page 326. IEEE, (2017)Co-occurrence Based Security Event Analysis and Visualization for Cyber Physical Systems., , , , and . HCI (40), volume 1226 of Communications in Computer and Information Science, page 540-548. Springer, (2020)Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural Networks., , and . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, volume 11980 of Lecture Notes in Computer Science, page 3-18. Springer, (2019)Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances., , , , and . RAID, volume 11050 of Lecture Notes in Computer Science, page 577-599. Springer, (2018)"Do you know existing accuracy metrics overrate time-series anomaly detections?"., , , and . SAC, page 403-412. ACM, (2022)Refining schizophrenia via graph reachability in Esterel., , , , and . MEMOCODE, page 18-27. IEEE, (2009)Over-Approximated Control Flow Graph Construction on Pure Esterel., , , , and . IEICE Trans. Inf. Syst., 93-D (5): 985-993 (2010)Automatic Hardware/Software Interface Generation for Embedded System., , , and . J. Inf. Process. Syst., 2 (3): 137-142 (2006)Two ICS Security Datasets and Anomaly Detection Contest on the HIL-based Augmented ICS Testbed., , , and . CSET @ USENIX Security Symposium, page 36-40. ACM, (2021)