Author of the publication

Network topology risk assessment of stealthy cyber attacks on advanced metering infrastructure networks.

, , , , and . CISS, page 1-6. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Particle swarm based model exploitation for parameter estimation of wave realizations., , , , and . SSCI, page 1-8. IEEE, (2016)GPS spoofing attack characterization and detection in smart grids., , , , and . CNS, page 391-395. IEEE, (2016)A Game-Theoretic Analysis of Decode-and-Forward Cooperation in Rayleigh Fading Channels., and . CISS, page 306-311. IEEE, (2007)User capacity in a CDMA macrocell with a hotspot microcell: effects of transmit power constraints and finite dispersion., , , and . GLOBECOM, page 1558-1562. IEEE, (2003)Optimal Public Electric Bus Fleet Charging Schedule with Solar and Energy Storage Considering Static and Dynamic Route Assignment., , , , and . SSCI, page 1-10. IEEE, (2021)Resource Allocation during Handoff through Dynamic Schemes for Mobile Multimedia Wireless Networks., , , and . INFOCOM, page 1204-1211. IEEE Computer Society, (1999)Discrete-Time Second-Order Distributed Consensus Time Synchronization Algorithm for Wireless Sensor Networks., and . EURASIP J. Wireless Comm. and Networking, (2009)Joint transmitter and receiver design with adaptive beamforming in MIMO SC-FDMA systems., and . ICASSP, page 3268-3271. IEEE, (2011)On performance evaluation of cooperative spectrum sensing in cognitive radio networks., , and . CISS, page 1-6. IEEE, (2010)Diversity factor-based capacity asymptotic approximations of MRC reception in Rayleigh fading channels., and . IEEE Trans. Commun., 56 (6): 858-861 (2008)