Author of the publication

Teleoperation of a mobile robot with time-varying delay and force feedback.

, , , and . Robotica, 30 (1): 67-77 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collision avoidance method for multi-operator multi-robot teleoperation system., , , and . Robotica, 36 (1): 78-95 (2018)Survey on network-based botnet detection methods., , and . Secur. Commun. Networks, 7 (5): 878-903 (2014)Attacker Profiling Through Analysis of Attack Patterns in Geographically Distributed Honeypots., , and . CoRR, (2023)Observer Effect: How Intercepting HTTPS Traffic Forces Malware to Change Their Behavior., , and . CACIC, volume 790 of Communications in Computer and Information Science, page 272-281. Springer, (2017)The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement Learning., and . ESORICS (4), volume 14347 of Lecture Notes in Computer Science, page 44-64. Springer, (2023)Growth and Commoditization of Remote Access Trojans., and . EuroS&P Workshops, page 454-462. IEEE, (2020)Bringing a GAN to a Knife-Fight: Adapting Malware Communication to Avoid Detection., and . IEEE Symposium on Security and Privacy Workshops, page 70-75. IEEE Computer Society, (2018)Catch Me if You Can: Improving Adversaries in Cyber-Security with Q-Learning Algorithms., , , and . ICAART (3), page 442-449. SCITEPRESS, (2023)Teleoperation of a mobile robot with time-varying delay and force feedback., , , and . Robotica, 30 (1): 67-77 (2012)OpenADR and Agreement Audit Architecture for a Complete Cycle of a Flexibility Solution., , , , , and . Sensors, 21 (4): 1204 (2021)