Piroska Haller

According to our database1, Piroska Haller authored at least 27 papers between 2008 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


On the practical integration of anomaly detection techniques in industrial control applications.
IJCIP, 2019

Engineering security-aware control applications for data authentication in smart industrial cyber-physical systems.
Future Generation Comp. Syst., 2019

Designing Optimal and Resilient Intrusion Detection Architectures for Smart Grids.
IEEE Trans. Smart Grid, 2017

Cyber-Security-Aware Network Design of Industrial Control Systems.
IEEE Systems Journal, 2017

Using Sensitivity Analysis and Cross-Association for the Design of Intrusion Detection Systems in Industrial Cyber-Physical Systems.
IEEE Access, 2017

Cross-layer anomaly detection in industrial cyber-physical systems.
Proceedings of the 25th International Conference on Software, 2017

Optimally scheduled interventions in the presence of vulnerabilities for modern cyber-physical systems.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

Design, verification and implementation of a lightweight remote attestation protocol for process control systems.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

Software Defined Response and Network Reconfiguration for Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection XI, 2017

Enforcing End-to-End Security in Scada Systems via Application-Level Cryptography.
Proceedings of the Critical Infrastructure Protection XI, 2017

A framework for designing resilient distributed intrusion detection systems for critical infrastructures.
IJCIP, 2016

Big Data Processing to Detect Abnormal Behavior in Smart Grids.
Proceedings of the Smart Grid Inspired Future Technologies, 2016

A hierarchical control plane for software-defined networks-based industrial control systems.
Proceedings of the 2016 IFIP Networking Conference, 2016

A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures.
IJCIP, 2015

Experimental assessment of network design approaches for protecting industrial control systems.
IJCIP, 2015

A clustering-based approach to detect cyber attacks in process control systems.
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015

A framework for testing stealthy attacks in energy grids.
Proceedings of the IEEE International Conference on Intelligent Computer Communication and Processing, 2015

A Linear Programming Approach for K-Resilient and Reliability-Aware Design of Large-Scale Industrial Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 14th International Conference, 2015

Communication delay and jitter influence on bilateral teleoperation.
Proceedings of the 22nd Mediterranean Conference on Control and Automation, 2014

Network Controller for Teleoperated Mobile Robotic Agents.
Proceedings of the Intelligent Autonomous Systems 13, 2014

A connection pattern-based approach to detect network traffic anomalies in critical infrastructures.
Proceedings of the Seventh European Workshop on System Security, 2014

Passive bilateral teleoperation with bounded control signals.
Proceedings of the 11th IEEE International Conference on Industrial Informatics, 2013

Towards Automated Secure Web Service Execution.
Proceedings of the NETWORKING 2009, 2009

A syntactic approach for identifying multi-protocol attacks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

Middleware for Automated Implementation of Security Protocols.
Proceedings of the Semantic Web: Research and Applications, 2009

A Modeling Framework for Generating Security Protocol Specifications.
Proceedings of the SYNASC 2008, 2008

Constructing Security Protocol Specifications for Web Services.
Proceedings of the Intelligent Distributed Computing, Systems and Applications, Proceedings of the 2nd International Symposium on Intelligent Distributed Computing, 2008