Author of the publication

Two ICS Security Datasets and Anomaly Detection Contest on the HIL-based Augmented ICS Testbed.

, , , and . CSET @ USENIX Security Symposium, page 36-40. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances., , , , and . RAID, volume 11050 of Lecture Notes in Computer Science, page 577-599. Springer, (2018)Two ICS Security Datasets and Anomaly Detection Contest on the HIL-based Augmented ICS Testbed., , , and . CSET @ USENIX Security Symposium, page 36-40. ACM, (2021)POSTER: CPS Security Testbed Development Using Controller-in-the-Middle., , , , and . AsiaCCS, page 829-831. ACM, (2018)HAI 1.0: HIL-based Augmented ICS Security Dataset., , , and . CSET @ USENIX Security Symposium, USENIX Association, (2020)Dataflow-based Control Process Identification for ICS Dataset Development., , , , and . CSET @ USENIX Security Symposium, page 54-58. ACM, (2022)Generating Abnormal Industrial Control Network Traffic for Intrusion Detection System Testing., , , , , and . Critical Infrastructure Protection, volume 542 of IFIP Advances in Information and Communication Technology, page 265-281. Springer, (2018)Identity-Based Signcryption from Identity-Based Cryptography., , and . WISA, volume 7115 of Lecture Notes in Computer Science, page 70-83. Springer, (2011)Implementation of Programmable CPS Testbed for Anomaly Detection., , , and . CSET @ USENIX Security Symposium, USENIX Association, (2019)