2

Transparent TSN for Agnostic End-hosts via P4-based Traffic Characterization at Switches

Time sensitive networking security: issues of precision time protocol and its implementation

Constrained Proximity Attacks on Mobile Targets

Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy

A toolbox for assessing the impacts of cyber-physical attacks on water distribution systems

The Battle Of The Attack Detection Algorithms: Disclosing Cyber Attacks On Water Distribution Networks

A Survey of Physics-Based Attack Detection in Cyber-Physical Systems

Messmanipulationen in Steuerungssystemen

Advanced Security Testbed Framework for Wearable IoT Devices

Physical-Layer Integrity for Wireless Messages