Author of the publication

Characterizing and Modeling Patching Practices of Industrial Control Systems.

, , , , and . POMACS, 1 (1): 18:1-18:23 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining Redundant Industrial Alarm Occurrences with Association Rules Extraction and Complex Networks Modeling., , and . SEDE, page 281-288. ISCA, (2010)Comparative Analysis of Power Consumption in the Implementation of Arithmetic Algorithms., , , and . TrustCom, page 1247-1254. IEEE Computer Society, (2011)On the Efficiency of Sampling and Countermeasures to Critical-Infrastructure-Targeted Malware Campaigns., , , , and . SIGMETRICS Performance Evaluation Review, 43 (4): 33-42 (2016)Mining redundant industrial alarm occurrences with association rules extraction and complex networks modeling., , and . J. Comput. Meth. in Science and Engineering, 11 (Supplement-1): 15-28 (2011)Comparative Analyses of Power Consumption in Arithmetic Algorithms Implementation., , , and . RITA, 18 (2): 234-250 (2011)WAP: Models and metrics for the assessment of critical-infrastructure-targeted malware campaigns., , , , , and . ISSRE, page 330-335. IEEE Computer Society, (2015)Rejuvenation and the Spread of Epidemics in General Topologies., , , , and . ISSRE Workshops, page 414-419. IEEE Computer Society, (2014)Characterizing and Modeling Patching Practices of Industrial Control Systems., , , , and . SIGMETRICS (Abstracts), page 9. ACM, (2017)