Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A machine learning approach for packet loss prediction in science flows., , and . Future Gener. Comput. Syst., (2020)Designed-in Security for Cyber-Physical Systems., , , , and . IEEE Secur. Priv., 12 (5): 9-12 (2014)Isolating Insecurely: A Call to Arms for the Security and Privacy Community During the Time of COVID-19.. IEEE Secur. Priv., 18 (4): 4-7 (2020)Lyapunov Stability of Smart Inverters Using Linearized DistFlow Approximation., , , , , , and . CoRR, (2020)Learning Behavior of Distribution System Discrete Control Devices for Cyber-Physical Security., , , , , , , , and . IEEE Trans. Smart Grid, 11 (1): 749-761 (2020)Detecting control system misbehavior by fingerprinting programmable logic controller functionality., , , and . Int. J. Crit. Infrastructure Prot., (2019)Phasor Measurement Units Optimal Placement and Performance Limits for Fault Localization., , , , , , and . IEEE J. Sel. Areas Commun., 38 (1): 180-192 (2020)Blockchain as a Trusted Component in Cloud SLA Verification., , , and . UCC Companion, page 93-100. ACM, (2019)Optimum Noise Mechanism for Differentially Private Queries in Discrete Finite Sets., , , , , and . CoRR, (2021)Unsafe at Any Clock Speed: The Insecurity of Computer System Design, Implementation, and Operation.. IEEE Secur. Priv., 20 (1): 4-9 (2022)