Author of the publication

Security Enhancements for Distributed Control Systems.

, , and . Critical Infrastructure Protection, volume 253 of IFIP, page 133-146. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure SCADA Communications, Monitoring and Control over the Internet., , , and . CAINE, page 169-174. ISCA, (2005)Security Enhancements for Distributed Control Systems., , and . Critical Infrastructure Protection, volume 253 of IFIP, page 133-146. Springer, (2007)Improving the cyber security of SCADA communication networks., , and . Commun. ACM, 52 (7): 139-142 (2009)Internet-Application Development Using the Six Sigma Approach., and . International Conference on Internet Computing, page 54-62. CSREA Press, (2007)Security enhancement for SCADA communication protocols using augmented vulnerability trees., , and . CAINE, page 244-251. ISCA, (2006)Security Considerations in DNP3 SCADA Systems., and . CAINE, page 73-78. ISCA, (2004)Color Texture Analysis of Rice Leaves Diagnosing Deficiency in the Balance of Mineral Levels towards Improvement of Crop Productivity., , , , and . ICIT, page 85-90. IEEE Computer Society, (2007)Improvements in SCADA and DCS Systems Security., , , , , , and . CATA, page 194-200. ISCA, (2007)Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements., , and . Int. J. Inf. Manag., 28 (6): 483-491 (2008)A Metrics-Based Software Maintenance Effort Model., , and . CSMR, page 254-260. IEEE Computer Society, (2004)