Author of the publication

Security Implications of Transport Layer Protocols in Power Grid Synchrophasor Data Communication.

, , and . IEEE Trans. Smart Grid, 7 (2): 807-816 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Flow Invariants-Based Approach to Microgrid Management., , , , , and . IEEE Trans. Smart Grid, 6 (2): 516-525 (2015)Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on Compensation., , and . COMPSAC Workshops, page 158-163. IEEE Computer Society, (2010)Nondeducibility-Based Analysis of Cyber-Physical Systems., and . Critical Infrastructure Protection, volume 311 of IFIP Advances in Information and Communication Technology, page 169-183. Springer, (2009)Polysizemic Encryption: Towards a Variable-Length Output Symmetric-Key Cryptosystem., , and . COMPSAC (2), page 688-693. IEEE, (2019)Impact of Resource-Constrained Networks on the Performance of NIST Round-3 PQC Candidates., and . COMPSAC, page 768-773. IEEE, (2021)Information flow security in cyber-physical systems., , , and . CSIIRW, page 52. ACM, (2011)Efficient targeted key subset retrieval in fractal hash sequences., , and . ACM Conference on Computer and Communications Security, page 1273-1284. ACM, (2013)Towards Detecting Sex Offenders in Social Networks., and . COMPSAC (2), page 113-118. IEEE Computer Society, (2017)978-1-5386-0367-3.Mitigating Event Confidentiality Violations in Smart Grids: An Information Flow Security-Based Approach., , , and . IEEE Trans. Smart Grid, 4 (3): 1227-1234 (2013)Mission-Critical Cloud Computing for Critical Infrastructures., , , , , , , and . Smart Grids, CRC Press, (2014)