Author of the publication

Layered Information Structure for Hierarchical Security Management of Critical Infrastructure Using Network Security Appliances.

, , , , and . HCI (33), volume 1032 of Communications in Computer and Information Science, page 197-204. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Co-occurrence Based Security Event Analysis and Visualization for Cyber Physical Systems., , , , and . HCI (40), volume 1226 of Communications in Computer and Information Science, page 540-548. Springer, (2020)Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural Networks., , and . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, volume 11980 of Lecture Notes in Computer Science, page 3-18. Springer, (2019)Vendor-Independent Monitoring on Programmable Logic Controller Status for ICS Security Log Management., , , , , and . AsiaCCS, page 682-684. ACM, (2019)Implementation of Programmable CPS Testbed for Anomaly Detection., , , and . CSET @ USENIX Security Symposium, USENIX Association, (2019)Layered Information Structure for Hierarchical Security Management of Critical Infrastructure Using Network Security Appliances., , , , and . HCI (33), volume 1032 of Communications in Computer and Information Science, page 197-204. Springer, (2019)POSTER: Expanding a Programmable CPS Testbed for Network Attack Analysis., , , and . AsiaCCS, page 928-930. ACM, (2020)HAI 1.0: HIL-based Augmented ICS Security Dataset., , , and . CSET @ USENIX Security Symposium, USENIX Association, (2020)Call-Flow Aware API Fuzz Testing for Security of Windows Systems., , , and . ICCSA Workshops, page 19-25. IEEE Computer Society, (2008)Time-Series Aware Precision and Recall for Anomaly Detection: Considering Variety of Detection Result and Addressing Ambiguous Labeling., , , and . CIKM, page 2241-2244. ACM, (2019)Data-Driven Field Mapping of Security Logs for Integrated Monitoring., , , , and . Critical Infrastructure Protection, volume 570 of IFIP Advances in Information and Communication Technology, page 253-268. Springer, (2019)