Author of the publication

Devil in the Detail: Attack Scenarios in Industrial Applications.

, , and . IEEE Symposium on Security and Privacy Workshops, page 169-174. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security in Process: Visually Supported Triage Analysis in Industrial Process Data., , , , and . CoRR, (2019)Security in Process: Detecting Attacks in Industrial Process Data., , , and . CECC, page 5:1-5:6. ACM, (2019)Neural Network-Based Channel Prediction and Its Performance in Multi-Antenna Systems., and . VTC Fall, page 1-6. IEEE, (2018)Secure (S)Hell: Introducing an SSH Deception Proxy Framework., , , and . CyberSA, page 1-6. IEEE, (2021)CPU Resource Resilience in Wireless Mobile Communications: Design and Evaluation on COTS Virtual Distributed Platform., , , , and . BlackSeaCom, page 43-48. IEEE, (2022)Deterministic Planning for Flexible Intralogistics., , , and . ICAC, page 1-6. IEEE, (2021)Secure Federated Learning: An Evaluation of Homomorphic Encrypted Network Traffic Prediction., , , and . CCNC, page 1-6. IEEE, (2023)A Comparison of Wireless Channel Predictors: Artificial Intelligence Versus Kalman Filter., and . ICC, page 1-6. IEEE, (2019)Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests., , and . SoftCOM, page 1-6. IEEE, (2019)A Simple Cooperative Diversity Method Based on Deep-Learning-Aided Relay Selection., and . IEEE Trans. Veh. Technol., 70 (5): 4485-4500 (2021)