Author of the publication

Unknown Payload Anomaly Detection Based on Format and Field Semantics Inference in Cyber-Physical Infrastructure Systems.

, , , , and . IEEE Access, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Phase of Deleted File Recovery for Digital Forensics Research in Tizen., , , and . ICITCS, page 1-3. IEEE Computer Society, (2015)Security Analysis of Smart Watch and Band Devices., , , and . CSCI, page 655-658. IEEE, (2021)A Novel Security Framework for Industrial IoT Based on ISA 100.11a., , , , and . QSHINE, volume 272 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 61-72. Springer, (2018)Digital Forensic Practices and Methodologies for AI Speaker Ecosystems., , , , , , , , , and . Digit. Investig., (2019)Charlie, Charlie, Charlie on Industrial Control Systems: PLC Control Logic Attacks by Design, Not by Chance., , and . HOST, page 182-193. IEEE, (2024)Data Deletion and Recovery of Androd Plaforms., , , , , and . CSCI, page 651-654. IEEE, (2021)ExtSFR: scalable file recovery framework based on an Ext file system., , , and . Multim. Tools Appl., 79 (23-24): 16093-16111 (2020)Unknown Payload Anomaly Detection Based on Format and Field Semantics Inference in Cyber-Physical Infrastructure Systems., , , , and . IEEE Access, (2021)How Are Industrial Control Systems Insecure by Design? A Deeper Insight Into Real-World Programmable Logic Controllers., , , and . IEEE Secur. Priv., 21 (4): 10-19 (July 2023)Gadgets of Gadgets in Industrial Control Systems: Return Oriented Programming Attacks on PLCs., , , , and . HOST, page 215-226. IEEE, (2023)