Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Asset Discovery in Industrial Control Systems - Exploring the Problem., and . ICS-CSR, BCS, (2015)Examining Human Individual Differences in Cyber Security and Possible Implications for Human-Machine Interface Design., , , , , and . HCI (30), volume 12210 of Lecture Notes in Computer Science, page 51-66. Springer, (2020)Cross-domain situational awareness and collaborative working for cyber security., , and . CyberSA, page 1-8. IEEE, (2015)Combined Danger Signal and Anomaly-Based Threat Detection in Cyber-Physical Systems., , and . IoT 360 (1), volume 169 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 27-39. (2015)A Plausible Solution to SCADA Security Honeypot Systems., , and . BWCCA, page 443-448. IEEE, (2013)Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems., , , and . TrustCom, page 899-910. IEEE, (2020)The continuing evolution of the C-130 environmental control system, and . 29th International Conference on Environmental Systems, Denver, Society of Automotive Engineers, (July 1999)A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure., , , , , , and . CRITIS, volume 9578 of Lecture Notes in Computer Science, page 27-39. Springer, (2015)Algorithmic Explorations of Juxtaposition and Simultaneity in Computer-aided Composition.. ICMC, Michigan Publishing, (1990)Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research., , , , and . ICS-CSR, BCS, (2013)