Author of the publication

Countermeasures Selection via Evidence Theory

, , , and . Critical Information Infrastructure Security, Springer Berlin Heidelberg, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Decision Support with Interdependency Modeling., , , and . Critical Infrastructure Protection, volume 485 of IFIP Advances in Information and Communication Technology, page 169-183. (2016)Consensus of agents with fuzzy state., , and . SCIS&ISIS, page 1017-1022. IEEE, (2012)Critical node detection based on attacker preferences., , , , and . MED, page 773-778. IEEE, (2016)Finding critical nodes in infrastructure networks., , , , and . Int. J. Crit. Infrastructure Prot., (2018)Repositioning control of a two-link flexible arm by learning., , and . Autom., 33 (4): 579-590 (1997)Simulation of heterogeneous and interdependent critical infrastructures., , , and . Int. J. Crit. Infrastructures, 4 (1/2): 110-128 (2008)Countermeasures Selection via Evidence Theory, , , and . Critical Information Infrastructure Security, Springer Berlin Heidelberg, (2013)Evidence theory for Smart Grid diagnostics., , and . ISGT Europe, page 1-5. IEEE, (2013)Fuzzy Input-Output Inoperability Model - (Short Paper)., , and . CRITIS, volume 6983 of Lecture Notes in Computer Science, page 200-204. Springer, (2011)Identifying Critical Infrastructure Clusters via Spectral Analysis., , and . CRITIS, volume 9578 of Lecture Notes in Computer Science, page 223-235. Springer, (2015)