Author of the publication

WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels*.

, , , and . ICCA, page 724-731. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system., , , and . Cyber Security, page 1-8. IEEE, (2018)Helicopter Lands on Uneven Terrain by means of Articulated Robotic Legs-Modelling, Simulation and Control Approach., , and . AIM, page 1282-1287. IEEE, (2018)Neutralizing Adversarial Machine Learning in Industrial Control Systems Using Blockchain., , , , and . Cyber Science, page 437-451. Springer, (2022)Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features., , , and . IJCNN, page 1-8. IEEE, (2020)Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems., , , , and . Symmetry, 13 (3): 519 (2021)VNWTS: A Virtual Water Chlorination Process for Cybersecurity Analysis of Industrial Control Systems., , , and . SIN, page 1-7. IEEE, (2021)PLC memory attack detection and response in a clean water supply system., , , , and . Int. J. Crit. Infrastructure Prot., (2019)WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels*., , , and . ICCA, page 724-731. IEEE, (2019)The personal computer as an interactive technology for the artist (simulation vs. abstraction).. Comput. Graph., 11 (3): 315-319 (1987)The computer and the right side of the brain II.. Comput. Graph., 15 (2): 313-318 (1991)