From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A decentralized honeypot for IoT Protocols based on Android devices., , , , и . Int. J. Inf. Sec., 21 (6): 1211-1222 (2022)Leaking supervisory controls and data acquisition commands over unpadded TCP/IP encryption through differential packet size analysis., , , и . Secur. Priv., (2020)Security in IoMT Communications: A Survey., , , , , и . Sensors, 20 (17): 4828 (2020)Chaos Engineering for Enhanced Resilience of Cyber-Physical Systems., , , и . CoRR, (2021)Protecting the Transportation Sector from the Negative Impacts of Climate Change., , , и . Critical Infrastructure Protection, том 512 из IFIP Advances in Information and Communication Technology, стр. 3-21. Springer, (2017)Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position., , , и . SECRYPT, стр. 100-111. SciTePress, (2015)Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP Packets., , , и . ESORICS (1), том 11098 из Lecture Notes in Computer Science, стр. 346-362. Springer, (2018)Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks., , , , и . ICETE (2), стр. 219-229. SciTePress, (2018)Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0., , и . Int. J. Inf. Sec., 21 (1): 37-59 (2022)Cyber-Attacks on the Oil & Gas Sector: A Survey on Incident Assessment and Attack Patterns., , и . IEEE Access, (2020)