Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security-Aware Scheduling of Embedded Control Tasks., , and . ACM Trans. Embed. Comput. Syst., 16 (5s): 188:1-188:21 (2017)Integrating Security in Resource-Constrained Cyber-Physical Systems., , and . CoRR, (2018)Security Analysis for Distributed IoT-Based Industrial Automation., , and . CoRR, (2020)IoT-Enabled Motion Control: Architectural Design Challenges and Solutions., , and . IEEE Trans. Ind. Informatics, 19 (3): 2284-2294 (March 2023)A Framework for Checkpointing and Recovery of Hierarchical Cyber-Physical Systems., , , , , , , , and . CoRR, (2022)Model-Based Design of Closed Loop Deep Brain Stimulation Controller using Reinforcement Learning., , , , , , and . ICCPS, page 108-118. IEEE, (2020)Network Scheduling for Secure Cyber-Physical Systems., , and . RTSS, page 45-55. IEEE Computer Society, (2017)Towards Plug-n-Play numerical control for Reconfigurable Manufacturing Systems., , and . ETFA, page 1-8. IEEE, (2016)Learning-based control design for deep brain stimulation., , , , , , and . ICCPS, page 349-350. IEEE Computer Society / ACM, (2018)Intrusion Detection and Localization for Networked Embedded Control Systems., , , , , and . CoRR, (2021)