Author of the publication

Detection and mitigation of deception attacks on cloud-based industrial control systems.

, , , and . ICIN, page 106-110. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Massive MIMO Pilot Scheduling over Cloud RAN for Industry 4.0., , , and . SoftCOM, page 1-6. IEEE, (2020)Enhancing Traffic Flow and Safety in Mixed Vehicle Fleets: Mitigating the Influence of Non-Cooperative Vehicles on Autonomous Intersection Management Systems., , and . SoftCOM, page 1-6. IEEE, (2023)A control theoretical approach to non-intrusive geo-replication for cloud services., , , , , and . CDC, page 1649-1656. IEEE, (2016)Prototyping intrusion detection in an industrial cloud-native digital twin., , , and . ICIT, page 749-755. IEEE, (2021)Control-over-the-cloud: A performance study for cloud-native, critical control systems., , , and . UCC, page 57-66. IEEE, (2020)Towards Practical Cell-Free 6G Network Deployments: An Open-Source End-to-End Ray Tracing Simulator., , , , and . ACSSC, page 1000-1005. IEEE, (2023)Quality-Elasticity: Improved Resource Utilization, Throughput, and Response Times Via Adjusting Output Quality to Current Operating Conditions., , , and . ICAC, page 52-62. IEEE, (2019)Using a Predator-Prey Model to Explain Variations of Cloud Spot Price., , , and . CoRR, (2017)Impact of etcd Deployment on Kubernetes, Istio, and Application Performance., , , , and . CoRR, (2020)Detection and mitigation of deception attacks on cloud-based industrial control systems., , , and . ICIN, page 106-110. IEEE, (2022)