From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

POSTER: CPS Security Testbed Development Using Controller-in-the-Middle., , , , и . AsiaCCS, стр. 829-831. ACM, (2018)A Comparison of ICS Datasets for Security Research Based on Attack Paths., , и . CRITIS, том 11260 из Lecture Notes in Computer Science, стр. 154-166. Springer, (2018)Structured whitelist generation in SCADA network using PrefixSpan algorithm., , , , и . APNOMS, стр. 326. IEEE, (2017)Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances., , , , и . RAID, том 11050 из Lecture Notes in Computer Science, стр. 577-599. Springer, (2018)Generating Abnormal Industrial Control Network Traffic for Intrusion Detection System Testing., , , , , и . Critical Infrastructure Protection, том 542 из IFIP Advances in Information and Communication Technology, стр. 265-281. Springer, (2018)One Step More: Automatic ICS Protocol Field Analysis., , , и . CRITIS, том 10707 из Lecture Notes in Computer Science, стр. 241-252. Springer, (2017)Data Visualization for Network Access Rules of Critical Infrastructure., , , , и . HCI (3), том 10273 из Lecture Notes in Computer Science, стр. 35-54. Springer, (2017)