Author of the publication

Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems.

, and . IEEE Trans. Reliability, 65 (1): 350-358 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hierarchical performance model for intrusion detection in cyber-physical systems., and . WCNC, page 2095-2100. IEEE, (2011)Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems., and . IEEE Trans. Reliability, 65 (1): 350-358 (2016)Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems., and . IEEE Trans. Reliability, 62 (1): 199-210 (2013)Foundations for Cyber Zone Defense., , and . ICCCN, page 1-7. IEEE, (2016)Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications., and . IEEE Trans. Syst. Man Cybern. Syst., 44 (5): 593-604 (2014)Linkography ontology refinement and cyber security., , , and . CCWC, page 1-9. IEEE, (2017)Enhanced dynamic cyber zone defense., and . CCWC, page 66-71. IEEE, (2018)Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications., and . IEEE Trans. Smart Grid, 4 (3): 1254-1263 (2013)Behavior Rule Based Intrusion Detection for Supporting Secure Medical Cyber Physical Systems., and . ICCCN, page 1-7. IEEE, (2012)Signalprint-Based Intrusion Detection in Wireless Networks., , and . SEWCN, volume 42 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 77-88. Springer, (2009)