From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Toward a cyber-physical topology language: applications to NERC CIP audit., , , , и . SEGS@CCS, стр. 93-104. ACM, (2013)CyberSAGE: The cyber security argument graph evaluation tool., , , , , , , и . Empir. Softw. Eng., 28 (1): 18 (2023)CoToRu: Automatic Generation of Network Intrusion Detection Rules from Code., , и . INFOCOM, стр. 720-729. IEEE, (2022)Design and User Study of a Constraint-based Framework for Business Logic Flaw Discovery., , и . SecDev, стр. 91-99. IEEE, (2022)From Application Security Verification Standard (ASVS) to Regulation Compliance: A Case Study in Financial Services Sector., , и . ISSRE Workshops, стр. 69-76. IEEE, (2021)An Improved Double Compression Detection Method for JPEG Image Forensics., , и . ISM, стр. 290-297. IEEE Computer Society, (2012)Developing Models for Physical Attacks in Cyber-Physical Systems., , , , , и . CPS-SPC@CCS, стр. 49-55. ACM, (2017)Protecting critical infrastructure systems using cyber, physical, and socio-technical models. University of Illinois Urbana-Champaign, USA, (2019)Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems., , , , , и . PRDC, стр. 125-134. IEEE, (2018)A Smart Grid Ontology: Vulnerabilities, Attacks, and Security Policies., , , и . CNS, стр. 1-6. IEEE, (2023)