33 results on '"Paul Tavolato"'
Search Results
2. How to Find out What's Going on in Encrypted Smart Meter Networks - without Decrypting Anything.
3. Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process.
4. Enhancing Trust in Machine Learning Systems by Formal Methods - With an Application to a Meteorological Problem.
5. A Game Theoretic Analysis of Cyber Threats.
6. PenQuest Reloaded: A Digital Cyber Defense Game for Technical Education.
7. Formalizing Real-world Threat Scenarios.
8. Anomaly Detection in Communication Networks of Cyber-physical Systems using Cross-over Data Compression.
9. Analytical Modelling of Cyber-physical Systems.
10. Analytical modelling of cyber-physical systems: applying kinetic gas theory to anomaly detection in networks.
11. Attacks on Industrial Control Systems - Modeling and Anomaly Detection.
12. Rule Creation in a Knowledge-assisted Visual Analytics Prototype for Malware Analysis.
13. Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems.
14. Anomaly Detection for Simulated IEC-60870-5-104 Trafiic.
15. Detection of Man-in-the-Middle Attacks on Industrial Control Networks.
16. Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis.
17. Malicious Behavior Patterns.
18. Defining Malicious Behavior.
19. Anomaly detection in substation networks.
20. Multi-Layer Agent-Based Simulation of Network Behaviour in Advanced Metering Infrastructures.
21. Advanced File Carving Approaches for Multimedia Files.
22. Anomaly detection in substation networks
23. Neural Net-Based Anomaly Detection System in Substation Networks
24. Ein Werkzeug zum Wissenserwerb.
25. Theoretische und empirische Untersuchungen der Benutzeroberfläche von zwei CAD-Systemen.
26. Detection of Man-in-the-Middle Attacks on Industrial Control Networks
27. Prototyping. Die Methode - das Werkzeug - die Erfahrungen.
28. Multi-Layer Agent-Based Simulation of Network Behaviour in Advanced Metering Infrastructures
29. Defining Malicious Behavior
30. Malicious Behavior Patterns
31. A preprocessor for the finite element program SAP IV
32. A Prototyping Methodology and Its Tool
33. CAD-Einsatz zur Mitbestimmung im Wohnbau
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.