Author of the publication

Leaking supervisory controls and data acquisition commands over unpadded TCP/IP encryption through differential packet size analysis.

, , , and . Secur. Priv., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A decentralized honeypot for IoT Protocols based on Android devices., , , , and . Int. J. Inf. Sec., 21 (6): 1211-1222 (2022)Leaking supervisory controls and data acquisition commands over unpadded TCP/IP encryption through differential packet size analysis., , , and . Secur. Priv., (2020)Chaos Engineering for Enhanced Resilience of Cyber-Physical Systems., , , and . CoRR, (2021)Security in IoMT Communications: A Survey., , , , , and . Sensors, 20 (17): 4828 (2020)Protecting the Transportation Sector from the Negative Impacts of Climate Change., , , and . Critical Infrastructure Protection, volume 512 of IFIP Advances in Information and Communication Technology, page 3-21. Springer, (2017)Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position., , , and . SECRYPT, page 100-111. SciTePress, (2015)Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP Packets., , , and . ESORICS (1), volume 11098 of Lecture Notes in Computer Science, page 346-362. Springer, (2018)Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks., , , , and . ICETE (2), page 219-229. SciTePress, (2018)Cyber-Attacks on the Oil & Gas Sector: A Survey on Incident Assessment and Attack Patterns., , and . IEEE Access, (2020)Interdependency analysis of junctions for congestion mitigation in Transportation Infrastructures., , , , and . SIGMETRICS Perform. Evaluation Rev., 45 (2): 119-124 (2017)