Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Isolating Insecurely: A Call to Arms for the Security and Privacy Community During the Time of COVID-19.. IEEE Secur. Priv., 18 (4): 4-7 (2020)Designed-in Security for Cyber-Physical Systems., , , , and . IEEE Secur. Priv., 12 (5): 9-12 (2014)A machine learning approach for packet loss prediction in science flows., , and . Future Gener. Comput. Syst., (2020)Lyapunov Stability of Smart Inverters Using Linearized DistFlow Approximation., , , , , , and . CoRR, (2020)Blockchain as a Trusted Component in Cloud SLA Verification., , , and . UCC Companion, page 93-100. ACM, (2019)Detecting control system misbehavior by fingerprinting programmable logic controller functionality., , , and . Int. J. Crit. Infrastructure Prot., (2019)Phasor Measurement Units Optimal Placement and Performance Limits for Fault Localization., , , , , , and . IEEE J. Sel. Areas Commun., 38 (1): 180-192 (2020)Learning Behavior of Distribution System Discrete Control Devices for Cyber-Physical Security., , , , , , , , and . IEEE Trans. Smart Grid, 11 (1): 749-761 (2020)Optimum Noise Mechanism for Differentially Private Queries in Discrete Finite Sets., , , , , and . CoRR, (2021)SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing With the Devil?, , and . IEEE Secur. Priv., 19 (2): 14-19 (2021)