Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber Meets Control: A Novel Federated Approach for Resilient CPS Leveraging Real Cyber Threat Intelligence., , , , , and . IEEE Commun. Mag., 55 (5): 198-204 (2017)A moving target approach for identifying malicious sensors in control systems., and . Allerton, page 1149-1156. IEEE, (2016)A Model Inversion Based Watermark for Replay Attack Detection with Output Tracking., , and . ACC, page 384-390. IEEE, (2019)Robust structural analysis and design of distributed control systems to prevent zero dynamics attacks., , and . CDC, page 1356-1361. IEEE, (2017)Active detection for exposing intelligent attacks in control systems., , , and . CCTA, page 1306-1312. IEEE, (2017)Detecting integrity attacks on control systems using a moving target approach., and . CDC, page 5820-5826. IEEE, (2015)Is your commute driving you crazy?: a study of misbehavior in vehicular platoons., , , and . WISEC, page 22:1-22:11. ACM, (2015)A Tutorial on Detecting Security Attacks on Cyber-Physical Systems., , , , and . ECC, page 979-984. IEEE, (2019)Sensor placement for reliable observability: a structured systems approach., , and . CDC, page 5414-5421. IEEE, (2016)Information flow for security in control systems., , , and . CDC, page 5065-5072. IEEE, (2016)