20 results on '"Paul Tavolato"'
Search Results
2. How to Find out What's Going on in Encrypted Smart Meter Networks - without Decrypting Anything.
3. Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process.
4. Enhancing Trust in Machine Learning Systems by Formal Methods - With an Application to a Meteorological Problem.
5. A Game Theoretic Analysis of Cyber Threats.
6. PenQuest Reloaded: A Digital Cyber Defense Game for Technical Education.
7. Formalizing Real-world Threat Scenarios.
8. Anomaly Detection in Communication Networks of Cyber-physical Systems using Cross-over Data Compression.
9. Analytical Modelling of Cyber-physical Systems.
10. Attacks on Industrial Control Systems - Modeling and Anomaly Detection.
11. Rule Creation in a Knowledge-assisted Visual Analytics Prototype for Malware Analysis.
12. Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems.
13. Anomaly Detection for Simulated IEC-60870-5-104 Trafiic.
14. Detection of Man-in-the-Middle Attacks on Industrial Control Networks.
15. Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis.
16. Malicious Behavior Patterns.
17. Defining Malicious Behavior.
18. Multi-Layer Agent-Based Simulation of Network Behaviour in Advanced Metering Infrastructures.
19. Ein Werkzeug zum Wissenserwerb.
20. Theoretische und empirische Untersuchungen der Benutzeroberfläche von zwei CAD-Systemen.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.