Author of the publication

Moving Target Defense for Hardening the Security of the Power System State Estimation.

, , and . MTD@CCS, page 59-68. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Adversarial Robustness by Diversity in an Ensemble of Specialized Deep Neural Networks., , , and . Canadian AI, volume 12109 of Lecture Notes in Computer Science, page 1-14. Springer, (2020)Towards SDN enabled network control delegation in clouds., , , , and . DSN, page 1-6. IEEE Computer Society, (2013)On the Memorability of System-generated PINs: Can Chunking Help?, , , , and . SOUPS, page 197-209. USENIX Association, (2015)Malicious data detection in state estimation leveraging system losses & estimation of perturbed parameters., , , and . SmartGridComm, page 402-407. IEEE, (2013)Formal Analysis of Fault-tolerant Group Key Management Using ZooKeeper., , and . CCGRID, page 636-641. IEEE Computer Society, (2013)Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption., , , , , , , and . NDSS, The Internet Society, (2019)A Novel Scheduling Framework Leveraging Hardware Cache Partitioning for Cache-Side-Channel Elimination in Clouds., , , , , and . CoRR, (2017)CPS-SPC 2017: Third Workshop on Cyber-Physical Systems Security and PrivaCy., and . CCS, page 2629-2630. ACM, (2017)False Data Detection in Distributed Oscillation Mode Estimation using Hierarchical k-means., and . SmartGridComm, page 1-7. IEEE, (2019)Inter-flow consistency: A novel SDN update abstraction for supporting inter-flow constraints., , , and . CNS, page 469-478. IEEE, (2015)