Personensuche
X
?
Proceedings of the 9th ACM Cyber-Physical System Security Workshop ,
3
Blind Concealment from Reconstruction-based Attack Detector..:
, In:
?
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses ,
4
FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industri..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
5
White-Box Concealment Attacks Against Anomaly Detectors for..:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
6
FetchBench: Systematic Identification and Characterization ..:
, In:
?
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) ,
7
Get Your Cyber-Physical Tests Done! Data-Driven Vulnerabili..:
, In:
?
Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security ,
8
Déjà Vu? Challenges and Opportunities for AM Security from ..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
11
Identifying Near-Optimal Single-Shot Attacks on ICSs with L..:
, In:
?
Proceedings of the 38th Annual Computer Security Applications Conference ,
12
Assessing Model-free Anomaly Detection in Industrial Contro..:
, In:
?
Proceedings of the 4th Workshop on CPS & IoT Security and Privacy ,
13
Security Analysis of Vendor Implementations of the OPC UA P..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
14
Microarchitectural Leakage Templates and Their Application ..:
, In:
?
2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall) ,
15