From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems., , , , и . CNS, стр. 1-9. IEEE, (2018)Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems., , , , и . EAI Endorsed Trans. Security Safety, 8 (28): e5 (2021)Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System., , , , и . CCTA, стр. 1692-1697. IEEE, (2018)RAPID: Traffic-agnostic intrusion detection for resource-constrained wireless mesh networks., , , и . Comput. Secur., (2014)A Review of Cybersecurity Incidents in the Water Sector., , , , , , и . CoRR, (2020)Security and Privacy Considerations for Machine Learning Models Deployed in the Government and Public Sector (white paper)., , , , и . CoRR, (2020)Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System., , , , и . SecureComm (2), том 305 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 146-160. Springer, (2019)FL-WBC: Enhancing Robustness against Model Poisoning Attacks in Federated Learning from a Client Perspective., , , , , и . NeurIPS, стр. 12613-12624. (2021)Efficient flooding in Wireless Sensor Networks secured with neighborhood keys., , и . WiMob, стр. 119-126. IEEE Computer Society, (2011)Towards effective security control assignment in the Industrial Internet of Things., , и . WF-IoT, стр. 795-800. IEEE Computer Society, (2015)