Author of the publication

Attack-Defense Modeling of Material Extrusion Additive Manufacturing Systems.

, , , , , , and . Critical Infrastructure Protection, volume 666 of IFIP Advances in Information and Communication Technology, page 121-153. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Manipulation of G-Code Toolpath Files in 3D Printers: Attacks and Mitigations., , , , , and . Critical Infrastructure Protection, volume 666 of IFIP Advances in Information and Communication Technology, page 155-174. Springer, (2022)A Data Collection and Annotation Tool for Asynchronous Multimodal Data During Human-Computer Interactions., , , , , , , , , and . HCI (29), volume 13330 of Lecture Notes in Computer Science, page 201-211. Springer, (2022)Attack-Defense Modeling of Material Extrusion Additive Manufacturing Systems., , , , , , and . Critical Infrastructure Protection, volume 666 of IFIP Advances in Information and Communication Technology, page 121-153. Springer, (2022)On the Effectiveness of Recurrent Neural Networks for Live Modeling of Cyber-Physical Systems., , , , , , and . ICII, page 309-317. IEEE, (2019)The Old-Boy Network and the Young-Gun Effect. International Economic Review, 41 (4): 871--891 (306 11 2000)doi: 10.1111/1468-2354.00088.Contextual, flow-based access control with scalable host-based SDN techniques., , , and . INFOCOM, page 1-9. IEEE, (2016)On the feasibility of cloud-based SDN controllers for residential networks., , , and . NFV-SDN, page 1-6. IEEE, (2017)From an IP Address to a Street Address: Using Wireless Signals to Locate a Target., , and . WOOT, USENIX Association, (2013)Public information and electoral bias., and . Games Econ. Behav., 68 (1): 353-375 (2010)Can the User Help? Leveraging User Actions for Network Profiling., , , and . SDS, page 1-8. IEEE, (2021)