Personensuche
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
1
Identifying Near-Optimal Single-Shot Attacks on ICSs with L..:
, In:
?
Proceedings of the 6th ACM on Cyber-Physical System Security Workshop ,
2
Evaluating Cascading Impact of Attacks on Resilience of Ind..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
3
A Modular Hybrid Learning Approach for Black-Box Security T..:
, In:
?
Proceedings of the 9th ACM Cyber-Physical System Security Workshop ,
7
Blind Concealment from Reconstruction-based Attack Detector..:
, In:
?
Proceedings of the 9th ACM Cyber-Physical System Security Workshop ,
8
Preventing Reverse Engineering of Control Programs in Indus..:
, In:
?
ICC 2023 - IEEE International Conference on Communications ,
9
Selective Encryption Framework for Securing Communication i..:
, In:
?
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) ,
10
Provable Adversarial Safety in Cyber-Physical Systems:
, In:
?
2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) ,
11
Timing Analysis of GOOSE in a Real-World Substation:
, In:
?
Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses ,
12
AttkFinder: Discovering Attack Vectors in PLC Programs usin..:
, In:
?
Proceedings of the 34th Annual Computer Security Applications Conference ,
13
Finding Dependencies between Cyber-Physical Domains for Sec..:
, In:
?
Proceedings of the 2017 International Workshop on Managing Insider Security Threats ,
14
TWOS : A Dataset of Malicious Insider Threat Behavior Ba..:
, In:
?
2016 XXI Symposium on Signal Processing, Images and Artificial Vision (STSIVA) ,
15