Author of the publication

Mixed Holistic Reductionistic Approach for Impact Assessment of Cyber Attacks.

, , , and . EISIC, page 123-130. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fitness-sharing based genetic algorithm for collaborative multi-robot localization., , and . Intelligent Service Robotics, 3 (3): 137-149 (2010)Monte Carlo Filter in Mobile Robotics Localization: A Clustered Evolutionary Point of View., , , and . Journal of Intelligent and Robotic Systems, 47 (2): 155-174 (2006)Finding critical nodes in infrastructure networks., , , , and . Int. J. Crit. Infrastructure Prot., (2018)Repositioning control of a two-link flexible arm by learning., , and . Autom., 33 (4): 579-590 (1997)Enhancing Decision Support with Interdependency Modeling., , , and . Critical Infrastructure Protection, volume 485 of IFIP Advances in Information and Communication Technology, page 169-183. (2016)Consensus of agents with fuzzy state., , and . SCIS&ISIS, page 1017-1022. IEEE, (2012)Critical node detection based on attacker preferences., , , , and . MED, page 773-778. IEEE, (2016)From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment., , , , , , , and . IEEE Syst. J., 13 (1): 424-435 (2019)Simulation of heterogeneous and interdependent critical infrastructures., , , and . Int. J. Crit. Infrastructures, 4 (1/2): 110-128 (2008)Evidence theory for Smart Grid diagnostics., , and . ISGT Europe, page 1-5. IEEE, (2013)