Author of the publication

One Step More: Automatic ICS Protocol Field Analysis.

, , , and . CRITIS, volume 10707 of Lecture Notes in Computer Science, page 241-252. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Structured whitelist generation in SCADA network using PrefixSpan algorithm., , , , and . APNOMS, page 326. IEEE, (2017)Co-occurrence Based Security Event Analysis and Visualization for Cyber Physical Systems., , , , and . HCI (40), volume 1226 of Communications in Computer and Information Science, page 540-548. Springer, (2020)Obfuscation of Critical Infrastructure Network Traffic Using Fake Communication., , and . CRITIS, volume 8985 of Lecture Notes in Computer Science, page 268-274. Springer, (2014)Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances., , , , and . RAID, volume 11050 of Lecture Notes in Computer Science, page 577-599. Springer, (2018)Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural Networks., , and . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, volume 11980 of Lecture Notes in Computer Science, page 3-18. Springer, (2019)"Do you know existing accuracy metrics overrate time-series anomaly detections?"., , , and . SAC, page 403-412. ACM, (2022)Refining schizophrenia via graph reachability in Esterel., , , , and . MEMOCODE, page 18-27. IEEE, (2009)Two ICS Security Datasets and Anomaly Detection Contest on the HIL-based Augmented ICS Testbed., , , and . CSET @ USENIX Security Symposium, page 36-40. ACM, (2021)Probabilistic Attack Sequence Generation and Execution Based on MITRE ATT&CK for ICS Datasets., , and . CSET @ USENIX Security Symposium, page 41-48. ACM, (2021)Time-Series Aware Precision and Recall for Anomaly Detection: Considering Variety of Detection Result and Addressing Ambiguous Labeling., , , and . CIKM, page 2241-2244. ACM, (2019)