Author of the publication

Design and evaluation of a cyber-physical testbed for improving attack resilience of power systems.

, , , , , , and . IET Cyper-Phys. Syst.: Theory & Appl., 6 (4): 208-227 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Runtime Generation of Association Rules., , and . CIKM, page 466-473. ACM, (2001)Understanding Security Vulnerabilities in File Systems., , and . APSys, page 8-15. ACM, (2019)White and gray matter development in human fetal, newborn and pediatric brains., , , , , , , , , and 1 other author(s). NeuroImage, 33 (1): 27-38 (2006)Anisotropic diffusion for object segmentation., and . SMC, page 1563-1567. IEEE, (2000)VTOS: Research on Methodology of "Light-Weight" Formal Design and Verification for Microkernel OS., , and . ICICS, volume 8233 of Lecture Notes in Computer Science, page 17-32. Springer, (2013)Event Ticket Price Prediction with Deep Neural Network on Spatial-Temporal Sparse Data., and . CoRR, (2019)Multi-physics simulations for combined temperature/humidity loading of potted electronic assemblies., , and . Microelectron. Reliab., 54 (6-7): 1182-1191 (2014)Large Feedback Arc Sets, High Minimum Degree Subgraphs, and Long Cycles in Eulerian Digraphs., , , , and . Comb. Probab. Comput., 22 (6): 859-873 (2013)Maximum F1-Score Discriminative Training Criterion for Automatic Mispronunciation Detection., , , and . IEEE ACM Trans. Audio Speech Lang. Process., 23 (4): 787-797 (2015)Uighur Character Recognition Based on Adaptive Models., , , and . IIH-MSP, page 476-479. IEEE, (2012)