Piroska Haller
Orcid: 0000-0002-5611-2429
According to our database1,
Piroska Haller
authored at least 49 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
5
10
2
5
3
1
2
1
2
7
1
1
2
2
1
5
2
3
3
1
3
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Evaluation Techniques for Long Short-Term Memory Models: Overfitting Analysis and Handling Missing Values.
Proceedings of the Advances and Trends in Artificial Intelligence. Theory and Applications, 2024
2022
Corrigendum to 'VetaDetect: Vehicle tampering detection with closed-loop model ensemble' International Journal of Critical Infrastructure Protection, 37 (2022), 100525.
Int. J. Crit. Infrastructure Prot., 2022
Int. J. Crit. Infrastructure Prot., 2022
Tampering Detection for Automotive Exhaust Aftertreatment Systems using Long Short-Term Memory Predictive Networks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
2020
MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks.
Proceedings of the 2020 IFIP Networking Conference, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Cyber attack detection and mitigation: Software Defined Survivable Industrial Control Systems.
Int. J. Crit. Infrastructure Prot., 2019
On the practical integration of anomaly detection techniques in industrial control applications.
Int. J. Crit. Infrastructure Prot., 2019
Engineering security-aware control applications for data authentication in smart industrial cyber-physical systems.
Future Gener. Comput. Syst., 2019
A lightweight key generation scheme for end-to-end data authentication in Industrial Control Systems.
Autom., 2019
Proceedings of the 7th International Symposium on Digital Forensics and Security, 2019
Proceedings of the 15th IEEE International Conference on Intelligent Computer Communication and Processing, 2019
2018
GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control.
Proceedings of the Security in Computer and Information Sciences, 2018
2017
IEEE Trans. Smart Grid, 2017
IEEE Syst. J., 2017
Using Sensitivity Analysis and Cross-Association for the Design of Intrusion Detection Systems in Industrial Cyber-Physical Systems.
IEEE Access, 2017
Proceedings of the 25th International Conference on Software, 2017
Optimally scheduled interventions in the presence of vulnerabilities for modern cyber-physical systems.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017
Design, verification and implementation of a lightweight remote attestation protocol for process control systems.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017
Software Defined Response and Network Reconfiguration for Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection XI, 2017
Proceedings of the Critical Infrastructure Protection XI, 2017
2016
A framework for designing resilient distributed intrusion detection systems for critical infrastructures.
Int. J. Crit. Infrastructure Prot., 2016
Proceedings of the Smart Grid Inspired Future Technologies, 2016
A hierarchical control plane for software-defined networks-based industrial control systems.
Proceedings of the 2016 IFIP Networking Conference, 2016
2015
A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures.
Int. J. Crit. Infrastructure Prot., 2015
Experimental assessment of network design approaches for protecting industrial control systems.
Int. J. Crit. Infrastructure Prot., 2015
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015
Proceedings of the IEEE International Conference on Intelligent Computer Communication and Processing, 2015
A Linear Programming Approach for K-Resilient and Reliability-Aware Design of Large-Scale Industrial Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 14th International Conference, 2015
2014
Proceedings of the 22nd Mediterranean Conference on Control and Automation, 2014
Proceedings of the Intelligent Autonomous Systems 13, 2014
A connection pattern-based approach to detect network traffic anomalies in critical infrastructures.
Proceedings of the Seventh European Workshop on System Security, 2014
2013
Proceedings of the 11th IEEE International Conference on Industrial Informatics, 2013
2011
2010
CoRR, 2010
2009
CoRR, 2009
Proceedings of the NETWORKING 2009, 2009
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009
Proceedings of the Semantic Web: Research and Applications, 2009
2008
Proceedings of the SYNASC 2008, 2008
Proceedings of the Intelligent Distributed Computing, Systems and Applications, Proceedings of the 2nd International Symposium on Intelligent Distributed Computing, 2008