Author of the publication

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis.

, , , and . ISGT, page 1-8. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

G-NAS: A grid-based approach for negative authentication., , , , , , , and . CICS, page 9-18. IEEE, (2014)A malicious activity detection system utilizing predictive modeling in complex environments., , , , , , , and . CCNC, page 371-379. IEEE, (2014)A multi-core numerical framework for characterizing flow in oil reservoirs., , , and . SpringSim (HPC), page 166-174. SCS/ACM, (2011)InkBoard - Tablet PC Enabled Designoriented Learning., , , and . CATE, page 154-160. ACTA Press, (2004)An Interoperable Internet Scale Solution for RFID Network Security., , and . ICCCN, page 1-6. IEEE Computer Society, (2009)Clustering Household Electricity Use Profiles.. MLSDA@AUS-AI, page 19. ACM, (2013)System Recovery Concepts in a Distributed Processing System., , , and . ICC (2), page 558-561. Elsevier, (1984)Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining., , , and . PAISI, volume 7299 of Lecture Notes in Computer Science, page 96-111. Springer, (2012)Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study., , , and . IEEE Syst. J., 9 (1): 31-44 (2015)Investigation of local and non-local lattice Boltzmann models for transient heat transfer between non-stationary, disparate media., , , , and . Comput. Math. Appl., 79 (1): 174-194 (2020)