Castellanos, John Henry
528  Ergebnisse:
Personensuche X
?
1

Identifying Near-Optimal Single-Shot Attacks on ICSs with L..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
2

Evaluating Cascading Impact of Attacks on Resilience of Ind..:

, In: Proceedings of the 6th ACM on Cyber-Physical System Security Workshop,
 
?
3

A Modular Hybrid Learning Approach for Black-Box Security T..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
Castellanos, John Henry ; Zhou, Jianying - p. 196-216 , 2019
 
?
4

List of Contributors:

, In: Neurobiology of Brain Disorders,
 
?
5

List of Contributors:

, In: Stem Cell and Gene Therapy for Cardiovascular Disease,
Ascheim, Deborah D. ; Balkan, Wayne ; Bareja, Akshay... - p. xi-xiii , 2016
 
?
 
?
7

Blind Concealment from Reconstruction-based Attack Detector..:

, In: Proceedings of the 9th ACM Cyber-Physical System Security Workshop,
 
?
8

Preventing Reverse Engineering of Control Programs in Indus..:

, In: Proceedings of the 9th ACM Cyber-Physical System Security Workshop,
 
?
9

Selective Encryption Framework for Securing Communication i..:

, In: ICC 2023 - IEEE International Conference on Communications,
 
?
10

Provable Adversarial Safety in Cyber-Physical Systems:

, In: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P),
 
?
11

Timing Analysis of GOOSE in a Real-World Substation:

, In: 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm),
 
?
12

AttkFinder: Discovering Attack Vectors in PLC Programs usin..:

, In: Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses,
 
?
13

Finding Dependencies between Cyber-Physical Domains for Sec..:

, In: Proceedings of the 34th Annual Computer Security Applications Conference,
 
?
14

TWOS : A Dataset of Malicious Insider Threat Behavior Ba..:

, In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats,
 
?
15

Desing of a coded aperture base computed tomography archite..:

, In: 2016 XXI Symposium on Signal Processing, Images and Artificial Vision (STSIVA),
 
1-15