Author of the publication

OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements.

, , , and . CIC, page 1-10. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems., , , and . SmartGridComm, page 1-6. IEEE, (2018)HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems., , , , , , and . CCS, page 279-291. ACM, (2020)Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies., , , and . SACMAT, page 131-144. ACM, (2020)DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android., , , , and . SKM, volume 1549 of Communications in Computer and Information Science, page 23-36. Springer, (2021)Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service., , , , , , , , , and . USENIX Security Symposium, page 4169-4186. USENIX Association, (2021)Random Test Data Generation for Java Classes Annotated with JML Specifications., and . Software Engineering Research and Practice, page 385-391. CSREA Press, (2007)Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies., , , , and . EuroS&P, page 713-715. IEEE, (2021)SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality., , , and . SACMAT, page 79-90. ACM, (2023)SoK: Security of Programmable Logic Controllers., , , , and . USENIX Security Symposium, USENIX Association, (2024)No-Fly-Zone: Regulating Drone Fly-Overs Via Government and User-Controlled Authorization Zones., , and . MobiHoc, page 522-527. ACM, (2023)