Author of the publication

Attack-Defense Modeling of Material Extrusion Additive Manufacturing Systems.

, , , , , , and . Critical Infrastructure Protection, volume 666 of IFIP Advances in Information and Communication Technology, page 121-153. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attack-Defense Modeling of Material Extrusion Additive Manufacturing Systems., , , , , , and . Critical Infrastructure Protection, volume 666 of IFIP Advances in Information and Communication Technology, page 121-153. Springer, (2022)A framework for incorporating insurance in critical infrastructure cyber risk strategies., , , , and . Int. J. Crit. Infrastructure Prot., (2016)Defending Building Automation Systems Using DECOY Networks., , , , and . Critical Infrastructure Protection, volume 512 of IFIP Advances in Information and Communication Technology, page 297-317. Springer, (2017)Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment., , , , and . Critical Infrastructure Protection, volume 485 of IFIP Advances in Information and Communication Technology, page 3-25. (2016)Generating Honeypot Traffic for Industrial Control Systems., , , and . Critical Infrastructure Protection, volume 512 of IFIP Advances in Information and Communication Technology, page 193-223. Springer, (2017)Implementing Novel Defense Functionality in MPLS Networks Using Hyperspeed Signaling., , and . Critical Infrastructure Protection, volume 367 of IFIP Advances in Information and Communication Technology, page 91-106. Springer, (2011)Securing Bluetooth low Energy Locks from Unauthorizedaccess and Surveillance., , , , and . Critical Infrastructure Protection, volume 512 of IFIP Advances in Information and Communication Technology, page 319-338. Springer, (2017)Evaluating ITU-T G.9959 Based Wireless Systems Used in Critical Infrastructure Assets., , , , and . Critical Infrastructure Protection, volume 466 of IFIP Advances in Information and Communication Technology, page 209-227. Springer, (2015)Using timing-based side channels for anomaly detection in industrial control systems., , , , and . Int. J. Crit. Infrastructure Prot., (2016)Applying public health strategies to the protection of cyberspace., , , and . Int. J. Crit. Infrastructure Prot., 3 (3-4): 118-127 (2010)