Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Reinforcement Learning for Control of Probabilistic Boolean Networks., and . CoRR, (2019)Logic and learning in network cascades., and . Netw. Sci., 9 (S1): S157-S174 (October 2021)Concurrent Logic and Automata Combined: A Semantics for Components., and . FOCLASA, volume 175 of Electronic Notes in Theoretical Computer Science, page 135-151. Elsevier, (2006)Deep Reinforcement Learning for Stabilization of Large-scale Probabilistic Boolean Networks., , , and . CoRR, (2022)Spontaneous Emergence of Computation in Network Cascades., , and . CoRR, (2022)Towards Dynamic Threat Modelling in 5G Core Networks Based on MITRE ATT&CK., , , and . CoRR, (2021)Electric Vehicle Charging: a Survey on the Security Issues and Challenges of the Open Charge Point Protocol (OCPP)., , , , and . CoRR, (2022)HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles., , , , , and . IEEE Access, (2022)Synthesis and Pruning as a Dynamic Compression Strategy for Efficient Deep Neural Networks., and . DataMod@CIKM, volume 12611 of Lecture Notes in Computer Science, page 3-17. Springer, (2020)A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles., , , , , , and . Array, (2020)