From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Timing Analysis of GOOSE in a Real-World Substation., , , и . SmartGridComm, стр. 160-165. IEEE, (2022)A Modular Hybrid Learning Approach for Black-Box Security Testing of CPS., и . ACNS, том 11464 из Lecture Notes in Computer Science, стр. 196-216. Springer, (2019)Q-Floid: Android Malware detection with Quantitative Data Flow Graphs., , , и . SG-CRC, том 14 из Cryptology and Information Security Series, стр. 13-25. IOS Press, (2016)AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow Analysis., , , , и . RAID, стр. 235-250. ACM, (2021)Preventing Reverse Engineering of Control Programs in Industrial Control Systems., , , , и . CPSS@AsiaCCS, стр. 48-59. ACM, (2023)Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks., , , и . CPSS@AsiaCCS, стр. 36-47. ACM, (2023)Selective Encryption Framework for Securing Communication in Industrial Control Systems., , , и . ICC, стр. 4125-4130. IEEE, (2023)Enforcing Memory Safety in Cyber-Physical Systems., , , и . CyberICPS/SECPRE@ESORICS, том 10683 из Lecture Notes in Computer Science, стр. 127-144. Springer, (2017)Legacy-Compliant Data Authentication for Industrial Control System Traffic., , , и . ACNS, том 10355 из Lecture Notes in Computer Science, стр. 665-685. Springer, (2017)Evaluating Cascading Impact of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach., , и . CPSS@AsiaCCS, стр. 42-53. ACM, (2020)