Author of the publication

Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid.

, , , , and . ICS-CSR, BCS, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Smartphones Battery Life by Reducing Energy Waste of Background Applications., , , and . NGMAST, page 123-130. IEEE, (2014)A Secure Authentication and Key Management Scheme for Wireless Sensor Networks., and . S-CUBE, volume 143 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 51-60. Springer, (2014)Sensors Faults Classification and Faulty Signals Reconstruction Using Deep Learning., , , , , and . IEEE Access, (2024)NN-QuPiD Attack: Neural Network-Based Privacy Quantification Model for Private Information Retrieval Protocols., , , , and . Complex., (2021)Saving energy by delegating network activity to home gateways., , , and . IEEE Trans. Consumer Electronics, 61 (4): 445-453 (2015)Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid., , , , and . ICS-CSR, BCS, (2016)Smart proxying: An optimal strategy for improving battery life of mobile devices., , , and . IGCC, page 1-6. IEEE Computer Society, (2013)Bird's-eye view on the Automotive Cybersecurity Landscape & Challenges in adopting AI/ML., , and . FMEC, page 1-6. IEEE, (2021)XANDAR: An X-by-Construction Framework for Safety, Security, and Real-Time Behavior of Embedded Software Systems., , , , , , , , , and 27 other author(s). DATE, page 1-6. IEEE, (2024)Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid., , , , and . PST, page 1-10. IEEE Computer Society, (2018)