Author of the publication

Man-in-the-middle attacks and defence in a power system cyber-physical testbed.

, , , , , , and . IET Cyper-Phys. Syst.: Theory & Appl., 6 (3): 164-177 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators' responsive behavior., and . Computers & Security, (2013)TMQ: Threat model quantification in Smart Grid critical infrastructures., and . SmartGridComm, page 584-589. IEEE, (2014)Detecting Industrial Control Malware Using Automated PLC Code Analytics., , and . IEEE Security & Privacy, 12 (6): 40-47 (2014)Secure Point-of-Care Medical Diagnostics via Trusted Sensing and Cyto-Coded Passwords., , , , and . DSN, page 583-594. IEEE Computer Society, (2016)CloudID: Trustworthy cloud-based and cross-enterprise biometric identification., , and . Expert Syst. Appl., 42 (21): 7905-7916 (2015)CollabLoc: Privacy-Preserving Multi-Modal Localization via Collaborative Information Fusion., , , and . CoRR, (2017)Algorithmic Attack Synthesis Using Hybrid Dynamics of Power Grid Critical Infrastructures., , , , and . DSN, page 151-162. IEEE Computer Society, (2018)CPAC: securing critical infrastructure with cyber-physical access control., , , , and . ACSAC, page 139-152. ACM, (2016)TroGuard: context-aware protection against web-based socially engineered trojans., , , and . ACSAC, page 66-75. ACM, (2014)RRE: A game-theoretic intrusion Response and Recovery Engine., , , and . DSN, page 439-448. IEEE Computer Society, (2009)