Personensuche
X
?
Passive and Active Measurement; Lecture Notes in Computer Science ,
1
From Power to Water: Dissecting SCADA Networks Across Diffe..:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
2
ICSvertase: A Framework for Purpose-based Design and Classi..:
, In:
?
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) ,
3
Characterizing Building Automation System Attacks and Attac..:
, In:
?
2022 IEEE Security and Privacy Workshops (SPW) ,
4
You Can't Protect What You Don't Understand: Characterizing..:
, In:
?
Proceedings of the 33rd Annual Computer Security Applications Conference ,
5
ECFI : Asynchronous Control Flow Integrity for Programma..:
, In:
?
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security ,
6
Sequence-aware Intrusion Detection in Industrial Control Sy..:
, In:
?
Proceedings of the 30th Annual Computer Security Applications Conference ,
7