Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Episteme: always work in progress. (October 2008)Quantifying the accuracy of relational statements in Wikipedia: a methodology., , and . JCDL, page 358. ACM, (2006)Beyond Digital Incunabula: Modeling the Next Generation of Digital Libraries., , , , , , , and . ECDL, volume 4172 of Lecture Notes in Computer Science, page 353-366. Springer, (2006)Services Make the Repository., , , , , and . J. Digit. Inf., (2007)Toward a cyber-physical topology language: applications to NERC CIP audit., , , , and . SEGS@CCS, page 93-104. ACM, (2013)Simulating Energy and Security Interactions in Semiconductor Manufacturing: Insights from the Intel Minifab Model., , , , , , and . WSC, page 3477-3488. IEEE, (2022)F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids., , , , and . DSN, page 407-418. IEEE Computer Society, (2016)Coastal Infrastructure Monitoring through Heterogeneous Autonomous Vehicles., , , , and . IRC, page 79-82. IEEE, (2020)Cyber-Physical Topology Language: Definition, Operations, and Application., , and . PRDC, page 60-69. IEEE Computer Society, (2015)XUTools: Unix Commands for Processing Next-Generation Structured Text., and . LISA, page 83-99. USENIX Association, (2012)