RRUSHI, JULIAN
RRUSHI, JULIAN
DIPARTIMENTO DI INFORMATICA E COMUNICAZIONE (attivo dal 01/01/2003 al 26/04/2012)
Mostra
records
Risultati 1 - 7 di 7 (tempo di esecuzione: 0.0 secondi).
Composite Intrusion Detection in Process Control Networks
2009 J. Rrushi
A product machine model for anomaly detection of interposition attacks on cyber-physical systems
2008 C. Bellettini, J.L. Rrushi
Memory corruption attacks, defenses, and evasions
2008 C. Bellettini, J.L. Rrushi
Combating memory corruption attacks on SCADA devices
2008 C. Bellettini, J. Rrushi
An Intrusion Detection System for Operation in Nuclear Power Plants
2007 J. Rrushi, R. Campbell
SCADA Protocol Obfuscation: A Proactive Defense Line in SCADA Systems
2007 C.N.M. Bellettini, J. Rrushi
Vulnerability Analysis of SCADA Protocol Binaries through Detection of Memory Access Taintedness
2007 C. Bellettini, J. Rrushi
Titolo | Data di pubblicazione | Autori | Tipo | File | Abstract |
---|---|---|---|---|---|
Composite Intrusion Detection in Process Control Networks | 2009 | J. Rrushi | Doctoral Thesis | - | |
A product machine model for anomaly detection of interposition attacks on cyber-physical systems | 2008 | C. BellettiniJ.L. Rrushi | Book Part (author) | - | |
Memory corruption attacks, defenses, and evasions | 2008 | C. BellettiniJ.L. RRushi | Book Part (author) | - | |
Combating memory corruption attacks on SCADA devices | 2008 | C. BellettiniJ. RRushi | Book Part (author) | - | |
An Intrusion Detection System for Operation in Nuclear Power Plants | 2007 | Julian Rrushi + | Conference Object | - | |
SCADA Protocol Obfuscation: A Proactive Defense Line in SCADA Systems | 2007 | Carlo BellettiniRRUSHI, JULIAN | Book Part (author) | - | |
Vulnerability Analysis of SCADA Protocol Binaries through Detection of Memory Access Taintedness | 2007 | C. BellettiniJ. Rrushi | Book Part (author) | - |