Author of the publication

POSTER: Expanding a Programmable CPS Testbed for Network Attack Analysis.

, , , and . AsiaCCS, page 928-930. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances., , , , and . RAID, volume 11050 of Lecture Notes in Computer Science, page 577-599. Springer, (2018)Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural Networks., , and . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, volume 11980 of Lecture Notes in Computer Science, page 3-18. Springer, (2019)Obfuscation of Critical Infrastructure Network Traffic Using Fake Communication., , and . CRITIS, volume 8985 of Lecture Notes in Computer Science, page 268-274. Springer, (2014)Co-occurrence Based Security Event Analysis and Visualization for Cyber Physical Systems., , , , and . HCI (40), volume 1226 of Communications in Computer and Information Science, page 540-548. Springer, (2020)"Do you know existing accuracy metrics overrate time-series anomaly detections?"., , , and . SAC, page 403-412. ACM, (2022)Structured whitelist generation in SCADA network using PrefixSpan algorithm., , , , and . APNOMS, page 326. IEEE, (2017)Two ICS Security Datasets and Anomaly Detection Contest on the HIL-based Augmented ICS Testbed., , , and . CSET @ USENIX Security Symposium, page 36-40. ACM, (2021)Probabilistic Attack Sequence Generation and Execution Based on MITRE ATT&CK for ICS Datasets., , and . CSET @ USENIX Security Symposium, page 41-48. ACM, (2021)Refining schizophrenia via graph reachability in Esterel., , , , and . MEMOCODE, page 18-27. IEEE, (2009)Packet Loss Consideration for Burst-Based Anomaly Detection in SCADA Network., , , and . WISA, volume 8909 of Lecture Notes in Computer Science, page 358-369. Springer, (2014)