Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber-Insurance for Cyber-Physical Systems., , and . CCTA, page 1704-1711. IEEE, (2018)Security and Privacy in Cyber-Physical Systems: A Survey of Surveys., , , , and . IEEE Design & Test, 34 (4): 7-17 (2017)Optimal Security Investments in a Prevention and Detection Game., , and . HotSoS, page 24-34. ACM, (2017)A New Burst-DFA model for SCADA Anomaly Detection., , and . CPS-SPC@CCS, page 1-12. ACM, (2017)Remote Proofs of Video Freshness for Public Spaces., and . CPS-SPC@CCS, page 111-122. ACM, (2017)Profiling Communications in Industrial IP Networks: Model Complexity and Anomaly Detection., , and . Security and Privacy Trends in the Industrial Internet of Thing, Springer, (2019)DDDAS for Attack Detection and Isolation of Control Systems., , , and . Handbook of Dynamic Data Driven Applications Systems, Springer, (2018)Controllability of Dynamical Systems: Threat Models and Reactive Security., , and . GameSec, volume 8252 of Lecture Notes in Computer Science, page 45-64. Springer, (2013)Cyber-Physical Systems Attestation., , and . DCOSS, page 354-357. IEEE Computer Society, (2014)Delay and sampling independence of a consensus algorithm and its application to smart grid privacy., , , , and . CDC, page 1389-1394. IEEE, (2014)