Search for persons
X
?
2024 International Conference on Control, Automation and Diagnosis (ICCAD) ,
1
Temporal Assessment of Malicious Behaviors: Application to ..:
, In:
?
2024 32nd Mediterranean Conference on Control and Automation (MED) ,
2
Actuator and Sensor Attacks Detection Method based on Attac..:
, In:
?
2024 32nd Mediterranean Conference on Control and Automation (MED) ,
3
Optimal Stealthy Attack Design Using Sequential Linear Prog..:
, In:
?
2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA) ,
4
Cyber Threat Assessment in Monitoring Turnout Railway Syste..:
, In:
?
2023 62nd IEEE Conference on Decision and Control (CDC) ,
5
Safety-Preserving Filters Against Stealthy Sensor and Actua..:
, In:
?
2022 European Control Conference (ECC) ,
6
Enforcing Safety under Actuator Injection Attacks through I..:
, In:
?
2020 IEEE International Conference on Industrial Technology (ICIT) ,
8
Aging Attacks against Electro-Mechanical Actuators from Con..:
, In:
?
2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) ,
9
Optimization of Process-Aware Attack Detection for Industri..:
, In:
?
2020 IEEE International Conference on Industrial Technology (ICIT) ,
10
Process-Aware Model-based Intrusion Detection System on Fil..:
, In:
?
2019 International Automatic Control Conference (CACS) ,
11
Prevention of Aging Attacks: Malicious Nature of the Contro..:
, In:
?
International journal of production research / Institution of Production Engineers ; American Institute of Industrial Engineers ; Society of Manufacturing Engineers
14
Towards Bayesian network methodology for predicting the equ..:
, In:Copies: Zentrale;