Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Physics-Informed Neural Networks for Securing Water Distribution Systems., , and . CoRR, (2020)Data-Driven Fault-Tolerant Tracking Control for Linear Parameter-Varying Systems., , , and . IEEE Access, (2022)Detection of Malicious Attacks in Autonomous Cyber-Physical Inverter-Based Microgrids., and . IEEE Trans. Ind. Informatics, 18 (9): 5815-5826 (2022)CPES-QSM: A Quantitative Method Toward the Secure Operation of Cyber-Physical Energy Systems., , and . IEEE Internet Things J., 10 (9, May 1): 7577-7590 (2023)Cybersecurity for the Smart Grid., and . Computer, 53 (5): 10-12 (2020)A Secure and Trusted Mechanism for Industrial IoT Network using Blockchain., , , and . CoRR, (2022)Process-Aware Attacks on Medication Control of Type-I Diabetics Using Infusion Pumps., , , and . IEEE Syst. J., 17 (2): 1831-1842 (June 2023)A Modular End-to-End Framework for Secure Firmware Updates on Embedded Systems., , and . ACM J. Emerg. Technol. Comput. Syst., 18 (1): 3:1-3:19 (2022)Cyber-Physical Energy Systems Security: Threat Modeling, Risk Assessment, Resources, Metrics, and Case Studies., , , and . CoRR, (2021)Experimental Impact Analysis of Cyberattacks in Power Systems using Digital Real-Time Testbeds., , , and . CoRR, (2023)