Author of the publication

Attacks on Distributed Sequential Control in Manufacturing Automation.

, , and . IEEE Trans. Ind. Informatics, 17 (2): 775-786 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacks on Distributed Sequential Control in Manufacturing Automation., , and . IEEE Trans. Ind. Informatics, 17 (2): 775-786 (2021)Vulnerability Analysis of Nonlinear Control Systems to Stealthy False Data Injection Attacks., and . CoRR, (2023)Integrating Security in Resource-Constrained Cyber-Physical Systems., , and . ACM Trans. Cyber Phys. Syst., 4 (3): 28:1-28:27 (2020)Cyber-Attacks on Wheeled Mobile Robotic Systems with Visual Servoing Control., , , , and . IROS, page 6342-6348. (2023)Distributing Sequential Control for Manufacturing Automation Systems., , , and . IEEE Trans. Control. Syst. Technol., 28 (4): 1586-1594 (2020)Context-Aware Temporal Logic for Probabilistic Systems., , and . ATVA, volume 12302 of Lecture Notes in Computer Science, page 215-232. Springer, (2020)Secure Planning Against Stealthy Attacks via Model-Free Reinforcement Learning., , and . CoRR, (2020)Rigorous Evaluation of Computer Processors with Statistical Model Checking., , , , and . MICRO, page 1242-1254. ACM, (2023)Formal Synthesis of Adaptive Droplet Routing for MEDA Biochips., , , and . DATE, page 324-329. IEEE, (2021)Networked realization of discrete-time controllers., , , and . ACC, page 2996-3001. IEEE, (2013)