From post

Assessing The Integrity Of Field Devices In Modbus Networks.

, , , , и . Critical Infrastructure Protection, том 290 из IFIP Advances in Information and Communication Technology, стр. 115-128. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Strategies for SCADA Networks., , , , и . Critical Infrastructure Protection, том 253 из IFIP, стр. 117-131. Springer, (2007)Providing Situational Awareness for Pipeline Control Operations., , , , и . Critical Infrastructure Protection, том 311 из IFIP Advances in Information and Communication Technology, стр. 97-111. Springer, (2009)Attack taxonomies for the Modbus protocols., , , и . Int. J. Crit. Infrastructure Prot., (2008)Extending Java for Package based Access Control., , , , и . ACSAC, стр. 67-76. IEEE Computer Society, (2000)An Architecture for SCADA Network Forensics., , , , и . IFIP Int. Conf. Digital Forensics, том 222 из IFIP Advances in Information and Communication Technology, стр. 273-285. Springer, (2006)Assessing The Integrity Of Field Devices In Modbus Networks., , , , и . Critical Infrastructure Protection, том 290 из IFIP Advances in Information and Communication Technology, стр. 115-128. Springer, (2008)Language Extensions for Programmable Security., , , и . DBSec, том 201 из IFIP Conference Proceedings, стр. 221-232. Kluwer, (2000)Forensic analysis of SCADA systems and networks., , , , и . Int. J. Secur. Networks, 3 (2): 95-102 (2008)