Piroska Haller

Orcid: 0000-0002-5611-2429

According to our database1, Piroska Haller authored at least 48 papers between 2008 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Corrigendum to 'VetaDetect: Vehicle tampering detection with closed-loop model ensemble' International Journal of Critical Infrastructure Protection, 37 (2022), 100525.
Int. J. Crit. Infrastructure Prot., 2022

VetaDetect: Vehicle tampering detection with closed-loop model ensemble.
Int. J. Crit. Infrastructure Prot., 2022

Tampering Detection for Automotive Exhaust Aftertreatment Systems using Long Short-Term Memory Predictive Networks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

2020
MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks.
Proceedings of the 2020 IFIP Networking Conference, 2020

Locality sensitive hashing for tampering detection in automotive systems.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Cyber attack detection and mitigation: Software Defined Survivable Industrial Control Systems.
Int. J. Crit. Infrastructure Prot., 2019

On the practical integration of anomaly detection techniques in industrial control applications.
Int. J. Crit. Infrastructure Prot., 2019

Engineering security-aware control applications for data authentication in smart industrial cyber-physical systems.
Future Gener. Comput. Syst., 2019

A lightweight key generation scheme for end-to-end data authentication in Industrial Control Systems.
Autom., 2019

Anomaly Detection in Aging Industrial Internet of Things.
IEEE Access, 2019

A Security-Enhanced Interoperability Middleware for the Internet of Things.
Proceedings of the 7th International Symposium on Digital Forensics and Security, 2019

Using Side-Channels to Detect Abnormal Behavior in Industrial Control Systems.
Proceedings of the 15th IEEE International Conference on Intelligent Computer Communication and Processing, 2019

2018
GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control.
Proceedings of the Security in Computer and Information Sciences, 2018

2017
Designing Optimal and Resilient Intrusion Detection Architectures for Smart Grids.
IEEE Trans. Smart Grid, 2017

Cyber-Security-Aware Network Design of Industrial Control Systems.
IEEE Syst. J., 2017

Using Sensitivity Analysis and Cross-Association for the Design of Intrusion Detection Systems in Industrial Cyber-Physical Systems.
IEEE Access, 2017

Cross-layer anomaly detection in industrial cyber-physical systems.
Proceedings of the 25th International Conference on Software, 2017

Optimally scheduled interventions in the presence of vulnerabilities for modern cyber-physical systems.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

Design, verification and implementation of a lightweight remote attestation protocol for process control systems.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

Software Defined Response and Network Reconfiguration for Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection XI, 2017

Enforcing End-to-End Security in Scada Systems via Application-Level Cryptography.
Proceedings of the Critical Infrastructure Protection XI, 2017

2016
A framework for designing resilient distributed intrusion detection systems for critical infrastructures.
Int. J. Crit. Infrastructure Prot., 2016

Big Data Processing to Detect Abnormal Behavior in Smart Grids.
Proceedings of the Smart Grid Inspired Future Technologies, 2016

A hierarchical control plane for software-defined networks-based industrial control systems.
Proceedings of the 2016 IFIP Networking Conference, 2016

2015
A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures.
Int. J. Crit. Infrastructure Prot., 2015

Experimental assessment of network design approaches for protecting industrial control systems.
Int. J. Crit. Infrastructure Prot., 2015

A clustering-based approach to detect cyber attacks in process control systems.
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015

A framework for testing stealthy attacks in energy grids.
Proceedings of the IEEE International Conference on Intelligent Computer Communication and Processing, 2015

A Linear Programming Approach for K-Resilient and Reliability-Aware Design of Large-Scale Industrial Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 14th International Conference, 2015

2014
Communication delay and jitter influence on bilateral teleoperation.
Proceedings of the 22nd Mediterranean Conference on Control and Automation, 2014

Network Controller for Teleoperated Mobile Robotic Agents.
Proceedings of the Intelligent Autonomous Systems 13, 2014

A connection pattern-based approach to detect network traffic anomalies in critical infrastructures.
Proceedings of the Seventh European Workshop on System Security, 2014

2013
Passive bilateral teleoperation with bounded control signals.
Proceedings of the 11th IEEE International Conference on Industrial Informatics, 2013

2011
Using Planetlab to Implement Multicast at the Application Level
CoRR, 2011

2010
End-Host Distribution in Application-Layer Multicast: Main Issues and Solutions
CoRR, 2010

A Platform for Implementing Secure Wireless Ad Hoc Networks
CoRR, 2010

2009
Performance Evaluation of Security Protocols
CoRR, 2009

Certificate-based Single Sign-On Mechanism for Multi-Platform Distributed Systems
CoRR, 2009

Extending WS-Security to Implement Security Protocols for Web Services
CoRR, 2009

Automated Composition of Security Protocols
CoRR, 2009

Term-based composition of security protocols
CoRR, 2009

Component based platform for multimedia applications
CoRR, 2009

Informal specification-based performance evaluation of security protocols
CoRR, 2009

Towards Automated Secure Web Service Execution.
Proceedings of the NETWORKING 2009, 2009

A syntactic approach for identifying multi-protocol attacks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

Middleware for Automated Implementation of Security Protocols.
Proceedings of the Semantic Web: Research and Applications, 2009

2008
A Modeling Framework for Generating Security Protocol Specifications.
Proceedings of the SYNASC 2008, 2008

Constructing Security Protocol Specifications for Web Services.
Proceedings of the Intelligent Distributed Computing, Systems and Applications, Proceedings of the 2nd International Symposium on Intelligent Distributed Computing, 2008


  Loading...