Author of the publication

A framework for incorporating insurance in critical infrastructure cyber risk strategies.

, , , , and . Int. J. Crit. Infrastructure Prot., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An RF-DNA verification process for ZigBee networks., , and . MILCOM, page 1-6. IEEE, (2012)Comparison of High-end and Low-end Receivers for RF-DNA Fingerprinting., , and . MILCOM, page 24-29. IEEE, (2014)PHY foundation for multi-factor ZigBee node authentication., , and . GLOBECOM, page 795-800. IEEE, (2012)Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks., , , and . IPCCC, page 469-474. IEEE Computer Society, (2008)Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks., and . Critical Infrastructure Protection, volume 417 of IFIP Advances in Information and Communication Technology, page 63-79. Springer, (2013)Defending Building Automation Systems Using DECOY Networks., , , , and . Critical Infrastructure Protection, volume 512 of IFIP Advances in Information and Communication Technology, page 297-317. Springer, (2017)The Z-Wave routing protocol and its security implications., , , , and . Comput. Secur., (2017)Dimensional reduction analysis for Physical Layer device fingerprints with application to ZigBee and Z-Wave devices., , , and . MILCOM, page 360-365. IEEE, (2015)A framework for incorporating insurance in critical infrastructure cyber risk strategies., , , , and . Int. J. Crit. Infrastructure Prot., (2016)Sharpening the Stinger: Tuning KillerBee for Critical Infrastructure Warwalking., , , and . MILCOM, page 104-109. IEEE, (2014)