Piroska Haller

According to our database1, Piroska Haller authored at least 24 papers between 2008 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Engineering security-aware control applications for data authentication in smart industrial cyber-physical systems.
Future Generation Comp. Syst., 2019

2017
Designing Optimal and Resilient Intrusion Detection Architectures for Smart Grids.
IEEE Trans. Smart Grid, 2017

Cyber-Security-Aware Network Design of Industrial Control Systems.
IEEE Systems Journal, 2017

Using Sensitivity Analysis and Cross-Association for the Design of Intrusion Detection Systems in Industrial Cyber-Physical Systems.
IEEE Access, 2017

Cross-layer anomaly detection in industrial cyber-physical systems.
Proceedings of the 25th International Conference on Software, 2017

Optimally scheduled interventions in the presence of vulnerabilities for modern cyber-physical systems.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

Design, verification and implementation of a lightweight remote attestation protocol for process control systems.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

Software Defined Response and Network Reconfiguration for Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection XI, 2017

Enforcing End-to-End Security in Scada Systems via Application-Level Cryptography.
Proceedings of the Critical Infrastructure Protection XI, 2017

2016
A framework for designing resilient distributed intrusion detection systems for critical infrastructures.
IJCIP, 2016

A hierarchical control plane for software-defined networks-based industrial control systems.
Proceedings of the 2016 IFIP Networking Conference, 2016

2015
A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures.
IJCIP, 2015

Experimental assessment of network design approaches for protecting industrial control systems.
IJCIP, 2015

A clustering-based approach to detect cyber attacks in process control systems.
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015

A framework for testing stealthy attacks in energy grids.
Proceedings of the IEEE International Conference on Intelligent Computer Communication and Processing, 2015

A Linear Programming Approach for K-Resilient and Reliability-Aware Design of Large-Scale Industrial Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 14th International Conference, 2015

2014
Network Controller for Teleoperated Mobile Robotic Agents.
Proceedings of the Intelligent Autonomous Systems 13, 2014

A connection pattern-based approach to detect network traffic anomalies in critical infrastructures.
Proceedings of the Seventh European Workshop on System Security, 2014

2013
Passive bilateral teleoperation with bounded control signals.
Proceedings of the 11th IEEE International Conference on Industrial Informatics, 2013

2009
Towards Automated Secure Web Service Execution.
Proceedings of the NETWORKING 2009, 2009

A syntactic approach for identifying multi-protocol attacks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

Middleware for Automated Implementation of Security Protocols.
Proceedings of the Semantic Web: Research and Applications, 2009

2008
A Modeling Framework for Generating Security Protocol Specifications.
Proceedings of the SYNASC 2008, 2008

Constructing Security Protocol Specifications for Web Services.
Proceedings of the Intelligent Distributed Computing, Systems and Applications, Proceedings of the 2nd International Symposium on Intelligent Distributed Computing, 2008


  Loading...