Author of the publication

Thermostatically Controlled Loads in the Power System Under Cyberattacks.

, , , and . IEEE Internet Things J., 10 (6, March 15): 5256-5267 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Microgrid Risk Analysis Considering the Impact of Cyber Attacks on Solar PV and ESS Control Systems., , , , , and . IEEE Trans. Smart Grid, 8 (3): 1330-1339 (2017)Approaching the time lower bound on cloned-tag identification for large RFID systems., , and . Ad Hoc Networks, (2014)Trilevel Modeling of Cyber Attacks on Transmission Lines., and . IEEE Trans. Smart Grid, 8 (2): 720-729 (2017)Image registration algorithm based on point features of sub-pixel., , and . IGARSS, page 501-504. IEEE, (2015)Modeling of Local False Data Injection Attacks With Reduced Network Information., , , and . IEEE Trans. Smart Grid, 6 (4): 1686-1696 (2015)Object-Based Directional Query Processing in Spatial Databases., , and . IEEE Trans. Knowl. Data Eng., 15 (2): 295-304 (2003)Design of a software-defined resilient virtualized networking environment., , , and . DRCN, page 111-114. IEEE, (2015)Informed dynamic scheduling strategies for novel majority-logic decoding of non-binary LDPC codes., and . ICSPCS, page 1-6. IEEE, (2015)Implementing a Personal Health Record Cloud Platform Using Ciphertext-Policy Attribute-Based Encryption., , and . INCoS, page 8-14. IEEE, (2012)Transmission Line Rating Attack in Two-Settlement Electricity Markets., , , and . IEEE Trans. Smart Grid, 7 (3): 1346-1355 (2016)