Author of the publication

Automated Asset Discovery in Industrial Control Systems - Exploring the Problem.

, and . ICS-CSR, BCS, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The continuing evolution of the C-130 environmental control system, and . 29th International Conference on Environmental Systems, Denver, Society of Automotive Engineers, (July 1999)Automated Asset Discovery in Industrial Control Systems - Exploring the Problem., and . ICS-CSR, BCS, (2015)Combined Danger Signal and Anomaly-Based Threat Detection in Cyber-Physical Systems., , and . IoT 360 (1), volume 169 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 27-39. (2015)A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure., , , , , , and . CRITIS, volume 9578 of Lecture Notes in Computer Science, page 27-39. Springer, (2015)Algorithmic Explorations of Juxtaposition and Simultaneity in Computer-aided Composition.. ICMC, Michigan Publishing, (1990)Examining Human Individual Differences in Cyber Security and Possible Implications for Human-Machine Interface Design., , , , , and . HCI (30), volume 12210 of Lecture Notes in Computer Science, page 51-66. Springer, (2020)Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems., , , and . TrustCom, page 899-910. IEEE, (2020)Cross-domain situational awareness and collaborative working for cyber security., , and . CyberSA, page 1-8. IEEE, (2015)A Plausible Solution to SCADA Security Honeypot Systems., , and . BWCCA, page 443-448. IEEE, (2013)Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research., , , , and . ICS-CSR, BCS, (2013)