Author of the publication

Network Structural Vulnerability: A Multiobjective Attacker Perspective

, , , , , , and . IEEE Transactions on Systems, Man, and Cybernetics: Systems, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evidence theory for Smart Grid diagnostics., , and . ISGT Europe, page 1-5. IEEE, (2013)Countermeasures Selection via Evidence Theory, , , and . Critical Information Infrastructure Security, Springer Berlin Heidelberg, (2013)Fuzzy Input-Output Inoperability Model - (Short Paper)., , and . CRITIS, volume 6983 of Lecture Notes in Computer Science, page 200-204. Springer, (2011)Identifying Critical Infrastructure Clusters via Spectral Analysis., , and . CRITIS, volume 9578 of Lecture Notes in Computer Science, page 223-235. Springer, (2015)ISIM_GestureCapture: Java gesture recognition for natural interaction., , , , and . IxD&A, (2009)From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment., , , , , , , and . IEEE Syst. J., 13 (1): 424-435 (2019)Monte Carlo Filter in Mobile Robotics Localization: A Clustered Evolutionary Point of View., , , and . Journal of Intelligent and Robotic Systems, 47 (2): 155-174 (2006)A fitness-sharing based genetic algorithm for collaborative multi-robot localization., , and . Intelligent Service Robotics, 3 (3): 137-149 (2010)Adding and removing nodes in consensus, , , and . Control & Automation (MED), 2012 20th Mediterranean Conference on, page 1031--1036. IEEE, (2012)Path planning using a lazy spatial network PRM, , and . Control and Automation, 2009. MED'09. 17th Mediterranean Conference on, page 940--945. IEEE, (2009)