Author of the publication

Eridanus II: A Fossil from Reionization with an Off-Center Star Cluster

, , , , , , , , , , , , and . (2020)cite arxiv:2012.00043Comment: 17 pages, 12 figures, 3 tables. Accepted for publication in ApJ. Structural fitting code is available at https://github.com/jsimonastro/EriII-structural-fitting.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Closing the loop of SIEM analysis to Secure Critical Infrastructures., , , , and . CoRR, (2014)Energy-Based Detection of Multi-layer Flooding Attacks on Wireless Sensor Network., and . SAFECOMP Workshops, volume 8696 of Lecture Notes in Computer Science, page 339-349. Springer, (2014)Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Trees., , and . EWDC, volume 7869 of Lecture Notes in Computer Science, page 1-15. Springer, (2013)A GPS Spoofing Resilient WAMS for Smart Grid., , , and . EWDC, volume 7869 of Lecture Notes in Computer Science, page 134-147. Springer, (2013)Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks., , , and . 3PGCIC, page 247-254. IEEE, (2013)Eridanus II: A Fossil from Reionization with an Off-Center Star Cluster, , , , , , , , , and 3 other author(s). (2020)cite arxiv:2012.00043Comment: 17 pages, 12 figures, 3 tables. Accepted for publication in ApJ. Structural fitting code is available at https://github.com/jsimonastro/EriII-structural-fitting.A novel security information and event management system for enhancing cyber security in a hydroelectric dam., , , and . Int. J. Crit. Infrastructure Prot., (2016)Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks., , , , , , and . SAFECOMP, volume 8666 of Lecture Notes in Computer Science, page 214-229. Springer, (2014)An Hybrid Architecture to Enhance Attacks Detection on IT infrastructure., , , and . IDC, volume 570 of Studies in Computational Intelligence, page 437-442. Springer, (2014)Power Grid Outlier Treatment through Kalman Filter., , , , , and . ISSRE Workshops, page 407-412. IEEE Computer Society, (2014)