Author of the publication

Discovery, infiltration, and denial of service in a process control system wireless network.

, and . eCrime, page 1-9. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Modeled Cyber-Physical Systems for Independent Review of Intrusion Detection Systems., and . NCS, volume 1055 of Advances in Intelligent Systems and Computing, page 116-125. Springer, (2019)A testbed for SCADA control system cybersecurity research and pedagogy., , and . CSIIRW, page 27. ACM, (2011)Securing SCADA Applications Using OpenPLC With End-To-End Encryption., , and . ICSS, page 1-6. ACM, (2017)Virtualization of Industrial Control System Testbeds for Cybersecurity., , and . ICSS, page 10-14. ACM, (2016)Modeling a Midstream Oil Terminal for Cyber Security Risk Evaluation., and . Critical Infrastructure Protection, volume 542 of IFIP Advances in Information and Communication Technology, page 149-175. Springer, (2018)Privacy Protected ELF for Private Computing on Public Platforms., and . ARES, page 452-457. IEEE Computer Society, (2008)Development & expansion of an industrial control system security laboratory and an international research collaboration., , and . CSIIRW, page 18. ACM, (2013)Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security., , and . AISC, volume 138 of CRPIT, page 67-76. Australian Computer Society, (2013)Discovery, infiltration, and denial of service in a process control system wireless network., and . eCrime, page 1-9. IEEE, (2009)Classification of Disturbances and Cyber-Attacks in Power Systems Using Heterogeneous Time-Synchronized Data., , and . IEEE Trans. Ind. Informatics, 11 (3): 650-662 (2015)