Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CPS: market analysis of attacks against demand response in the smart grid., , , and . ACSAC, page 136-145. ACM, (2014)Security and privacy trade-offs in CPS by leveraging inherent differential privacy., , and . CCTA, page 1313-1318. IEEE, (2017)Timing of Cyber-Physical Attacks on Process Control Systems., , and . Critical Infrastructure Protection, volume 441 of IFIP Advances in Information and Communication Technology, page 29-45. Springer, (2014)Guest Editorial: Special Section on Security and Privacy in Industry 4.0., , , and . IEEE Trans. Ind. Informatics, 16 (10): 6530-6531 (2020)CPS: driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals., , , and . ACSAC, page 146-155. ACM, (2014)Resilience of Process Control Systems to Cyber-Physical Attacks., and . NordSec, volume 8208 of Lecture Notes in Computer Science, page 166-182. Springer, (2013)On the Stability of Cyber-Physical Control Systems With Sensor Multiplicative Attacks., , and . IEEE Access, (2022)Sampling based Computation of Viability Domain to Prevent Safety Violations by Attackers., , and . CoRR, (2021)A Survey of Physics-Based Attack Detection in Cyber-Physical Systems., , , , , , , , and . ACM Comput. Surv., 51 (4): 76:1-76:36 (2018)Understanding the physical and economic consequences of attacks on control systems., , , , , and . Int. J. Crit. Infrastructure Prot., 2 (3): 73-83 (2009)