Author of the publication

A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems.

, , , and . CRiSIS, volume 11391 of Lecture Notes in Computer Science, page 35-40. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

wIDS: A Multilayer IDS for Wireless-Based SCADA Systems., , , and . ICISS, volume 10717 of Lecture Notes in Computer Science, page 387-404. Springer, (2017)wirelessOrBAC: Towards an access-control-based IDS for Wireless Sensor Networks., , , and . ICCNS, page 96-103. ACM, (2017)Security Issue of WirelessHART Based SCADA Systems., , , and . CRiSIS, volume 9572 of Lecture Notes in Computer Science, page 225-241. Springer, (2015)A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems., , , and . CRiSIS, volume 11391 of Lecture Notes in Computer Science, page 35-40. Springer, (2018)Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks., , , and . ARES, page 157-166. IEEE Computer Society, (2016)Assessment and enforcement of wireless sensor network-based SCADA systems security. (Évaluation et mise en oeuvre de la sécurité dans les systèmes SCADA à base de réseaux de capteurs sans fil).. École nationale supérieure Mines-Télécom Atlantique Bretagne-Pays de la Loire, France, (2018)WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks Simulator., , , and . CyberICS/WOS-CPS@ESORICS, volume 9588 of Lecture Notes in Computer Science, page 63-78. Springer, (2015)Security Analysis of WirelessHART Communication Scheme., , , and . FPS, volume 10128 of Lecture Notes in Computer Science, page 223-238. Springer, (2016)