Author of the publication

Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems.

, , , , and . Symmetry, 13 (3): 519 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel TLS-based Fingerprinting approach that combines feature expansion and similarity mapping., , and . CoRR, (2024)Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems., , , , and . CoRR, (2024)The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System., , , and . DCOSS-IoT, page 453-460. IEEE, (2023)ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality., , , , , , , , and . CoRR, (2024)Newly engineered energy-based features for supervised anomaly detection in a physical model of a water supply system., , , , and . Ad Hoc Networks, (2021)Insider threat detection using principal component analysis and self-organising map., , and . SIN, page 274-279. ACM, (2017)A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system., , , and . Cyber Security, page 1-8. IEEE, (2018)Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier., , , and . IEEE BigData, page 5034-5039. IEEE, (2018)Reliability Analysis of Fault Tolerant Memory Systems., , , , and . CoRR, (2023)Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things., , and . SIN, page 1:1-1:6. ACM, (2018)