Locasto, Michael
110  Ergebnisse:
Personensuche X
?
1

A Communications Validity Detector for SCADA Networks:

, In: Critical Infrastructure Protection XV; IFIP Advances in Information and Communication Technology,
 
?
2

Cyber Security Awareness Requirements for Operational Techn..:

, In: Critical Infrastructure Protection XV; IFIP Advances in Information and Communication Technology,
 
?
3

Cyber State Requirements for Design and Validation of Trust..:

, In: IFIP Advances in Information and Communication Technology; Critical Infrastructure Protection XIV,
 
?
4

Towards Automated Augmentation and Instrumentation of Legac..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
5

A Comparative Analysis Approach for Deriving Failure Scenar..:

, In: IFIP Advances in Information and Communication Technology; Critical Infrastructure Protection XIII,
Locasto, Michael ; Balenson, David - p. 19-50 , 2019
 
?
6

Converting an Electric Power Utility Network to Defend Agai..:

, In: IFIP Advances in Information and Communication Technology; Critical Infrastructure Protection XIII,
 
?
7

Jumping the Air Gap : Modeling Cyber-Physical Attack Pat..:

, In: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy,
 
?
8

A Survey of Ethical Agreements in Information Security Cour..:

, In: Proceedings of the 47th ACM Technical Symposium on Computing Science Education,
Chukuka, Benedict ; Locasto, Michael - p. 479-484 , 2016
 
?
9

Teaching Security Using Hands-on Exercises in 2015 (Abstrac..:

, In: Proceedings of the 46th ACM Technical Symposium on Computer Science Education,
Weiss, Richard ; Locasto, Michael ; Mache, Jens... - p. 695 ff. , 2015
 
?
10

Panel Summary : The Future of Software Regulation:

, In: Proceedings of the 2014 New Security Paradigms Workshop,
 
?
12

Applied Cryptography and Network Security 

11th International Conference, ACNS 2013, Banff, AB, Canada...  Lecture Notes in Computer Science ; 7954;SpringerLink, Bücher
 
?
13

Intrusion detection for resource-constrained embedded contr..:

Reeves, Jason ; Ramaswamy, Ashwin ; Locasto, Michael..
International Journal of Critical Infrastructure Protection.  5 (2012)  2 - p. 74-83 , 2012
 
?
15

The future of biologically-inspired security : is there ..:

, In: Proceedings of the 2007 Workshop on New Security Paradigms,
 
1-15