Author of the publication

Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet.

, , , , and . Sicherheit, volume P-228 of LNI, page 407-418. GI, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kaur, Jaspreet
add a person with the name Kaur, Jaspreet
 

Other publications of authors with the same name

Countermeasures for Covert Channel-Internal Control Protocols., , and . ARES, page 422-428. IEEE Computer Society, (2015)Full friendly index set - I., and . Discrete Applied Mathematics, 161 (9): 1262-1274 (2013)Develop Leave Application using Blockchain Smart Contract., , , and . COMSNETS, page 547-549. IEEE, (2019)Extraction of Abnormal Portion of Brain Using Jaya Algorithm., , and . SocProS (2), volume 547 of Advances in Intelligent Systems and Computing, page 163-169. (2016)Edge Friendly Labelings of Graph - I., and . Ars Comb., (2016)Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making., , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 693-704. Springer, (2015)Fitting Membrane Resistance in Single Cardiac Myocytes reduces Variability in Parameters., , and . CinC, page 209-212. www.cinc.org, (2014)A Ultimate Approach of Mitigating Attacks in RPL Based Low Power Lossy Networks.. CoRR, (2019)Detecting anomalies in BACnet network data., , and . Sicherheit, volume P-256 of LNI, page 253-264. GI, (2016)Covert channel-internal control protocols: attacks and defense., , , , and . Security and Communication Networks, 9 (15): 2986-2997 (2016)