From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances., , , , и . RAID, том 11050 из Lecture Notes in Computer Science, стр. 577-599. Springer, (2018)Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural Networks., , и . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, том 11980 из Lecture Notes in Computer Science, стр. 3-18. Springer, (2019)Obfuscation of Critical Infrastructure Network Traffic Using Fake Communication., , и . CRITIS, том 8985 из Lecture Notes in Computer Science, стр. 268-274. Springer, (2014)Co-occurrence Based Security Event Analysis and Visualization for Cyber Physical Systems., , , , и . HCI (40), том 1226 из Communications in Computer and Information Science, стр. 540-548. Springer, (2020)"Do you know existing accuracy metrics overrate time-series anomaly detections?"., , , и . SAC, стр. 403-412. ACM, (2022)Structured whitelist generation in SCADA network using PrefixSpan algorithm., , , , и . APNOMS, стр. 326. IEEE, (2017)Two ICS Security Datasets and Anomaly Detection Contest on the HIL-based Augmented ICS Testbed., , , и . CSET @ USENIX Security Symposium, стр. 36-40. ACM, (2021)Probabilistic Attack Sequence Generation and Execution Based on MITRE ATT&CK for ICS Datasets., , и . CSET @ USENIX Security Symposium, стр. 41-48. ACM, (2021)Refining schizophrenia via graph reachability in Esterel., , , , и . MEMOCODE, стр. 18-27. IEEE, (2009)Packet Loss Consideration for Burst-Based Anomaly Detection in SCADA Network., , , и . WISA, том 8909 из Lecture Notes in Computer Science, стр. 358-369. Springer, (2014)