Cited By
View all- Johnson JBerg TAnderson BWright B(2022)Review of Electric Vehicle Charger Cybersecurity Vulnerabilities, Potential Impacts, and DefensesEnergies10.3390/en1511393115:11(3931)Online publication date: 26-May-2022
- Ulz THaas SSteger C(2021)Cyber-Physical System and Internet of Things SecurityResearch Anthology on Combating Denial-of-Service Attacks10.4018/978-1-7998-5348-0.ch018(328-357)Online publication date: 2021
- Morbitzer M(2019)Scanclave: Verifying Application Runtime Integrity in Untrusted Environments2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)10.1109/WETICE.2019.00050(198-203)Online publication date: Jun-2019
- Show More Cited By