Author of the publication

WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels*.

, , , and . ICCA, page 724-731. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel TLS-based Fingerprinting approach that combines feature expansion and similarity mapping., , and . CoRR, (2024)Newly engineered energy-based features for supervised anomaly detection in a physical model of a water supply system., , , , and . Ad Hoc Networks, (2021)The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System., , , and . DCOSS-IoT, page 453-460. IEEE, (2023)Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems., , , , and . CoRR, (2024)ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality., , , , , , , , and . CoRR, (2024)Insider threat detection using principal component analysis and self-organising map., , and . SIN, page 274-279. ACM, (2017)A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system., , , and . Cyber Security, page 1-8. IEEE, (2018)Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier., , , and . IEEE BigData, page 5034-5039. IEEE, (2018)Reliability Analysis of Fault Tolerant Memory Systems., , , , and . CoRR, (2023)Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things., , and . SIN, page 1:1-1:6. ACM, (2018)