Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Evaluating the Effectiveness of the HoneyBot: A Case Study., , and . CoRR, (2019)A first look at machine-to-machine power grid network traffic., , , and . SmartGridComm, page 884-889. IEEE, (2014)Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid., , , and . IEEE Trans. Dependable Sec. Comput., 16 (6): 1026-1039 (2019)A physical overlay framework for insider threat mitigation of power system devices., , , and . SmartGridComm, page 970-975. IEEE, (2014)An Empirical Study of TCP Vulnerabilities in Critical Power System Devices., , , and . SEGS@CCS, page 39-44. ACM, (2014)Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems., , , , and . NDSS, The Internet Society, (2016)Towards Secure Metering Data Analysis via Distributed Differential Privacy., , , and . DSN, page 780-785. IEEE Computer Society, (2014)Rethinking the Honeypot for Cyber-Physical Systems., , , , and . IEEE Internet Comput., 20 (5): 9-17 (2016)Network Based Fingerprinting Techniques for Industrial Control Systems.. Georgia Institute of Technology, Atlanta, GA, USA, (2019)base-search.net (ftgeorgiatech:oai:smartech.gatech.edu:1853/60668).Lowering the Barriers to Industrial Control System Security with GRFICS., , and . ASE @ USENIX Security Symposium, USENIX Association, (2018)