Author of the publication

Managing cyber security risks in industrial control systems with game theory and viable system modelling.

, , , , and . SoSE, page 266-271. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Container Escape Detection for Edge Devices., , , , , , , , , and 4 other author(s). SenSys, page 532-536. ACM, (2021)Challenges in the Design and Implementation of IoT Testbeds in Smart-Cities: A Systematic Review., , , , , , , and . CoRR, (2023)Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System., , , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 379-390. Springer, (2015)Federated Deep Learning for Intrusion Detection in IoT Networks., , , , , and . GLOBECOM, page 237-242. IEEE, (2023)A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model., , , and . SEC, volume 428 of IFIP Advances in Information and Communication Technology, page 438-445. Springer, (2014)Applying the ACPO Guidelines to Building Automation Systems., , , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 684-692. Springer, (2015)An Intrusion Detection System Based on Deep Belief Networks., , , and . SciSec, volume 13580 of Lecture Notes in Computer Science, page 377-392. Springer, (2022)Managing cyber security risks in industrial control systems with game theory and viable system modelling., , , , and . SoSE, page 266-271. IEEE, (2014)Measurement and Applications: Exploring the Challenges and Opportunities of Hierarchical Federated Learning in Sensor Applications., , , , , , , , , and 2 other author(s). IEEE Instrum. Meas. Mag., 26 (9): 21-31 (December 2023)A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model., , , and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 604-622. Springer, (2017)