Author of the publication

Challenges in Machine Learning based approaches for Real-Time Anomaly Detection in Industrial Control Systems.

, , and . CPSS@AsiaCCS, page 23-29. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A XML based Policy-Driven Management Information Service., , and . Integrated Network Management, page 277-280. IEEE, (2001)Fault detection effectiveness of mutation and data flow testing., and . Software Quality Journal, 4 (1): 69-83 (1995)Effective Crowdsourcing for Software Feature Ideation in Online Co-Creation Forums., , and . SEKE, page 119-124. Knowledge Systems Institute Graduate School, (2013)On predicting reliability of modules using code coverage., and . CASCON, page 22. IBM, (1996)Anomaly Detection in Critical Infrastructure Using Probabilistic Neural Network., , and . ATIS, volume 1116 of Communications in Computer and Information Science, page 129-141. Springer, (2019)Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning., , , and . CPSIOTSEC@CCS, page 35-40. ACM, (2021)Using Markov-Chains to Model Reliability and QoS for Deployed Service-Based Systems., , , , and . COMPSAC Workshops, page 356-361. IEEE Computer Society, (2011)Design of Intelligent Checkers to Enhance the Security and Safety of Cyber Physical Systems., and . COMPSAC Workshops, page 7-12. IEEE Computer Society, (2014)LISTEN: A Tool to Investigate the Use of Sound for the Analysis of Program Behavior., , , and . COMPSAC, page 184-189. IEEE Computer Society, (1995)Empirical Assessment of Methods to Detect Cyber Attacks on a Robot., , , and . HASE, page 248-251. IEEE Computer Society, (2016)