Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of Smart Grid Cyber Physical Infrastructures Using Game Theoretic Simulation., and . SSCI, page 455-462. IEEE, (2015)Multi-Agent System Case Studies in Command and Control, Information Fusion and Datat Managment., , and . Informatica (Slovenia), 28 (1): 78-89 (2004)Examining Coincident Failures and Usage Profiles in Reliability Analysis of an Embedded Vehicle Sub-System., , and . ESM, page 558-563. SCS Europe, (2002)Reliability analysis of CSP specifications using Petri nets and Markov processes., , , and . HICSS (2), page 516-524. IEEE Computer Society, (1995)On quantum authentication protocols., , , and . GLOBECOM, page 5. IEEE, (2005)Moving Toward Trustworthy Systems: R&D Essentials., and . Computer, 43 (9): 31-40 (2010)Composing, analyzing and validating software models to assess the performability of competing design candidates., and . Ann. Softw. Eng., (1999)Temporal Data Correlation Providing Enhanced Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation., and . Sensors, 23 (9): 4355 (2023)Specification and Analysis of Real-Time Systems Using CSP and Petri Nets., , and . Int. J. Softw. Eng. Knowl. Eng., 6 (2): 229-248 (1996)A Best-Effort Damage Mitigation Model for Cyber-Attacks on Smart Grids., , , and . COMPSAC (2), page 510-515. IEEE Computer Society, (2018)978-1-5386-2667-2.