Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating the Impact of Cyber-Attack Strategies for Stochastic Networked Control Systems., , and . IEEE Trans. Control. Netw. Syst., 7 (2): 747-757 (2020)A Network Monitoring Game with Heterogeneous Component Criticality Levels., , , and . CDC, page 4379-4384. IEEE, (2019)On Actuator Security Indices., , and . CRITIS, volume 11777 of Lecture Notes in Computer Science, page 182-187. Springer, (2019)Estimating the Impact of Cyber-Attack Strategies for Stochastic Control Systems., , and . CoRR, (2018)A Risk-Theoretical Approach to H2-Optimal Control Under Covert Attacks., , , and . CDC, page 4553-4558. IEEE, (2018)Exploiting Submodularity in Security Measure Allocation for Industrial Control Systems., , , and . SafeThings@SenSys, page 64-69. ACM, (2017)Security index based on perfectly undetectable attacks: Graph-theoretic conditions., , and . Autom., (2021)Quantifying the Impact of Cyber-Attack Strategies for Control Systems Equipped With an Anomaly Detector., , , and . ECC, page 331-337. IEEE, (2018)A Security Index for Actuators Based on Perfect Undetectability: Properties and Approximation., , and . Allerton, page 235-241. IEEE, (2018)Actuator Security Indices Based on Perfect Undetectability: Computation, Robustness, and Sensor Placement., , , and . IEEE Trans. Autom. Control., 65 (9): 3816-3831 (2020)