Sfoglia per Autore
Mostrati risultati da 1 a 7 di 7
SCADA Protocol Obfuscation: A Proactive Defense Line in SCADA Systems
2007 C.N.M. Bellettini, J. Rrushi
Vulnerability Analysis of SCADA Protocol Binaries through Detection of Memory Access Taintedness
2007 C. Bellettini, J. Rrushi
An Intrusion Detection System for Operation in Nuclear Power Plants
2007 J. Rrushi, R. Campbell
Combating memory corruption attacks on SCADA devices
2008 C. Bellettini, J. Rrushi
A product machine model for anomaly detection of interposition attacks on cyber-physical systems
2008 C. Bellettini, J.L. Rrushi
Memory corruption attacks, defenses, and evasions
2008 C. Bellettini, J.L. Rrushi
Composite Intrusion Detection in Process Control Networks
2009 J. Rrushi
Titolo | Data di pubblicazione | Autori | Tipo | File | Abstract |
---|---|---|---|---|---|
SCADA Protocol Obfuscation: A Proactive Defense Line in SCADA Systems | 2007 | Carlo BellettiniRRUSHI, JULIAN | Book Part (author) | - | |
Vulnerability Analysis of SCADA Protocol Binaries through Detection of Memory Access Taintedness | 2007 | C. BellettiniJ. Rrushi | Book Part (author) | - | |
An Intrusion Detection System for Operation in Nuclear Power Plants | 2007 | Julian Rrushi + | Conference Object | - | |
Combating memory corruption attacks on SCADA devices | 2008 | C. BellettiniJ. RRushi | Book Part (author) | - | |
A product machine model for anomaly detection of interposition attacks on cyber-physical systems | 2008 | C. BellettiniJ.L. Rrushi | Book Part (author) | - | |
Memory corruption attacks, defenses, and evasions | 2008 | C. BellettiniJ.L. RRushi | Book Part (author) | - | |
Composite Intrusion Detection in Process Control Networks | 2009 | J. Rrushi | Doctoral Thesis | - |
Mostrati risultati da 1 a 7 di 7
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile