Practical modbus flooding attack and detection S Bhatia, NS Kush, C Djamaludin, AJ Akande, E Foo Proceedings of the Twelfth Australasian Information Security Conference …, 2014 | 71 | 2014 |
Limitations of passively mapping logical network topologies AJ Akande, C Fidge, E Foo International Journal of Computer Network and Information Security 9 (2), 1-11, 2017 | 10 | 2017 |
Component modeling for scada network mapping AJ Akande, C Fidge, E Foo Proceedings of the 38th Australasian Computer Science Conference (ACSC 2015 …, 2015 | 5 | 2015 |
Cybersecurity for satellite smart critical infrastructure AJ Akande, E Foo, Z Hou, Q Li Emerging Smart Technologies for Critical Infrastructure, 1-22, 2023 | 4 | 2023 |
A Runtime Verification Framework for Cyber-Physical Systems Based on Data Analytics and LTL Formula Learning A James Akande, Z Hou, E Foo, Q Li International Conference on Formal Engineering Methods, 273-278, 2023 | | 2023 |
Ltl-Based Runtime Verification Framework for Cyber-Attack Anomaly Prediction in Cyber-Physical Systems AJ Akande, E Foo, Z Hou, Q Li Available at SSRN 4815651, 0 | | |