Author of the publication

Cyber Security Modeling of Non-Critical Nuclear Power Plant Digital Instrumentation.

, , and . Critical Infrastructure Protection, volume 570 of IFIP Advances in Information and Communication Technology, page 87-100. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Michael Beltle University of Stuttgart

Measurement and Simulation of the Shielding Effectiveness of Planar Material with Apertures using a ASTM D4935 TEM Cell, , and . 2023 International Symposium on Electromagnetic Compatibility : EMC Europe, IEEE, (2023)
Measurement and Simulation of the Shielding Effectiveness of Planar Material with Apertures using a ASTM D4935 TEM Cell, , and . 2023 International Symposium on Electromagnetic Compatibility : EMC Europe, IEEE, (2023)Using capacitive electric field sensors to measure transient overvoltages : a case study, , , , and . 23rd International Symposium on High Voltage Engineering (ISH 2023), page 20-25. Stevenage, Institution of Engineering and Technology, (2023)Measurement System for Surface Potentials in Realistic HVDC-GIS Environments, , , and . 23rd International Symposium on High Voltage Engineering (ISH 2023), page 543-547. Stevenage, Institution of Engineering and Technology, (2023)
 

Other publications of authors with the same name

Prototype of fault adaptive embedded software for large-scale real-time systems., , , , , and . Artif. Intell. Rev., 25 (4): 299-312 (2006)RTES demo system2004., , , , , , , , , and 6 other author(s). SIGBED Review, 2 (3): 1-6 (2005)Cyber Security Modeling of Non-Critical Nuclear Power Plant Digital Instrumentation., , and . Critical Infrastructure Protection, volume 570 of IFIP Advances in Information and Communication Technology, page 87-100. Springer, (2019)Prototype of Fault Adaptive Embedded Software for Large-Scale Real-Time Systems, , , , , and . CoRR, (2005)Leveraging Cyber-Physical System Honeypots to Enhance Threat Intelligence.. Critical Infrastructure Protection, volume 570 of IFIP Advances in Information and Communication Technology, page 209-233. Springer, (2019)Hybrid extensions for stateful attack graphs., , , , and . CISR, page 101-104. ACM, (2014)A framework for the design and deployment of a SCADA honeynet., and . CISR, page 121-124. ACM, (2014)Preventing the Mistraining of Anomaly-Based IDSs through Ensemble Systems., and . SERVICES, page 66-68. IEEE Computer Society, (2014)The Organization of the Cedar System., , , , , , , , , and 9 other author(s). ICPP (1), page 49-56. CRC Press, (1991)Security management of cyber physical control systems using NIST SP 800-82r2., , , , and . IWCMC, page 1864-1870. IEEE, (2017)