Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Covert Attacks in Cyber-Physical Control Systems., , and . IEEE Trans. Ind. Informatics, 13 (4): 1641-1651 (2017)A controller design for mitigation of passive system identification attacks in networked control systems., , and . J. Internet Serv. Appl., 9 (1): 2:1-2:19 (2018)Model-Based Stealth Attack to Networked Control System Based on Real-Time Ethernet., , , , , , , , and . IEEE Trans. Ind. Electron., 68 (8): 7672-7683 (2021)Distributed efficient localization in swarm robotics using Min-Max and Particle Swarm Optimization., , and . Expert Syst. Appl., (2016)A Low-Cost and Cloud Native Solution for Security Orchestration, Automation, and Response., , and . ISPEC, volume 13620 of Lecture Notes in Computer Science, page 115-139. Springer, (2022)Bio-inspired Active System Identification: a Cyber-Physical Intelligence Attack in Networked Control Systems., , and . Mob. Networks Appl., 25 (5): 1944-1957 (2020)Towards a Secure and Scalable Maritime Monitoring System Using Blockchain and Low-Cost IoT Technology., , , , and . Sensors, 22 (13): 4895 (2022)Soft Computing Optimization of Stealth Data Loss Attack to Industrial Control Systems., , , and . MetroInd4.0&IoT, page 710-714. IEEE, (2021)Data Acquisition and extraction on mobile devices-A Review., , and . MetroInd4.0& IoT, page 294-299. IEEE, (2022)Distributed efficient localization in swarm robotic systems using swarm intelligence algorithms., , and . Neurocomputing, (2016)