Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resource-Interaction Graph: Efficient Graph Representation for Anomaly Detection., , , , , , , , , and 6 other author(s). CoRR, (2022)Container Escape Detection for Edge Devices., , , , , , , , , and 4 other author(s). SenSys, page 532-536. ACM, (2021)A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model., , , and . SEC, volume 428 of IFIP Advances in Information and Communication Technology, page 438-445. Springer, (2014)Cybersecurity in Motion: A Survey of Challenges and Requirements for Future Test Facilities of CAVs., , , , , , , , , and 5 other author(s). CoRR, (2023)An Intrusion Detection System Based on Deep Belief Networks., , , and . SciSec, volume 13580 of Lecture Notes in Computer Science, page 377-392. Springer, (2022)Applying the ACPO Guidelines to Building Automation Systems., , , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 684-692. Springer, (2015)Managing cyber security risks in industrial control systems with game theory and viable system modelling., , , , and . SoSE, page 266-271. IEEE, (2014)A game theoretic defence framework against DoS/DDoS cyber attacks., , , and . Comput. Secur., (2013)Measurement and Applications: Exploring the Challenges and Opportunities of Hierarchical Federated Learning in Sensor Applications., , , , , , , , , and 2 other author(s). IEEE Instrum. Meas. Mag., 26 (9): 21-31 (December 2023)LE3D: A Lightweight Ensemble Framework of Data Drift Detectors for Resource-Constrained Devices., , , , , , , , , and 1 other author(s). CoRR, (2022)