Cited By
View all- Li ZMashima DOng WEsiner EKalbarczyk ZChang EQuek TGao DZhou JCardenas A(2024)On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic ControllersProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3645002(947-961)Online publication date: 1-Jul-2024
- Elbez GNahrstedt KHagenmeyer V(2024)Early Attack Detection for Securing GOOSE Network TrafficIEEE Transactions on Smart Grid10.1109/TSG.2023.327274915:1(899-910)Online publication date: Jan-2024
- Hotellier EBoukhobza NSicard FFrancq JMocanu S(2024)Behavior-Based Intrusion Detection Approach Deployed on a Naval Testbed2024 IEEE 29th International Conference on Emerging Technologies and Factory Automation (ETFA)10.1109/ETFA61755.2024.10710831(1-8)Online publication date: 10-Sep-2024
- Show More Cited By