Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A SCADA Intrusion Detection Framework that Incorporates Process Semantics., and . CISRC, page 6:1-6:5. ACM, (2016)Modeling and simulation of electric power substation employing an IEC 61850 network., , and . CISR, page 89-92. ACM, (2014)On Modeling Computer Networks for Vulnerability Analysis., , , , , and . DBSec, volume 256 of IFIP Conference Proceedings, page 233-244. Kluwer, (2002)Security Policy Coordination for Heterogeneous Information Systems., , , and . ACSAC, page 219-228. IEEE Computer Society, (1999)Formal Analysis of E-Commerce Protocols., , , and . ISADS, page 19-28. IEEE Computer Society, (2001)An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects., , , , , and . DBSec, volume 113 of IFIP Conference Proceedings, page 385-388. Chapman & Hall, (1997)A Framework for Hybrid Fuzzy Logic Intrusion Detection Systems., , , and . FUZZ-IEEE, page 325-330. IEEE, (2005)Automatic Generation of Attack Scripts from Attack Graphs., , , , and . ICDIS, page 267-274. IEEE, (2018)A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks., , , and . J. Netw. Syst. Manag., 13 (3): 253-267 (2005)Security Strategies for SCADA Networks., , , , and . Critical Infrastructure Protection, volume 253 of IFIP, page 117-131. Springer, (2007)