Author of the publication

Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks.

, and . IEEE Trans. Ind. Informatics, 10 (2): 1337-1347 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neural Network Approach to Locating Cryptography in Object Code., and . ETFA, page 1-4. IEEE, (2009)Neural Network Real Time Video Processor for Early Aircraft Detection., and . ETFA, page 1-4. IEEE, (2009)Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks., and . IEEE Trans. Ind. Informatics, 10 (2): 1337-1347 (2014)Centroid density of interval type-2 fuzzy sets: Comparing stochastic and deterministic defuzzification., and . FUZZ-IEEE, page 1560-1567. IEEE, (2011)Vulnerability identification and classification via text mining bug databases., , and . IECON, page 3612-3618. IEEE, (2014)Intelligent control in automation based on wireless traffic analysis., and . ETFA, page 249-256. IEEE, (2007)The Adaptive Critic Learning Agent (ACLA) algorithm: Towards problem independent neural network based optimizers., and . IJCNN, page 1-7. IEEE, (2012)Descending Deviation Optimization techniques for scheduling problems., and . ETFA, page 257-260. IEEE, (2008)Next Generation Emergency Communication Systems via Software Defined Networks., , , , , , , and . GREE, page 1-8. IEEE Computer Society, (2014)Machine Learning for Deep Brain Stimulation Efficacy using Dense Array EEG., , , , , and . HSI, page 143-150. IEEE, (2019)