From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Feasibility of Time-Synchronization Attacks Against PMU-Based State Estimation., , , , , и . IEEE Trans. Instrum. Meas., 69 (6): 3412-3427 (2020)A taxonomical analysis, current methods and objectives on location-routing problems., , , и . Int. Trans. Oper. Res., 20 (6): 795-822 (2013)A decision-support tool for a capacitated location-routing problem., , , и . Decis. Support Syst., 46 (1): 366-375 (2008)Sentiment analysis in tweets: an assessment study from classical to modern word representation models., , , , и . Data Min. Knowl. Discov., 37 (1): 318-380 (2023)Using clustering analysis in a capacitated location-routing problem., , , и . Eur. J. Oper. Res., 179 (3): 968-977 (2007)Sentiment analysis in tweets: an assessment study from classical to modern text representation models., , , , и . CoRR, (2021)Cyber-attack on packet-based time synchronization protocols: The undetectable Delay Box., , и . I2MTC, стр. 1-6. IEEE, (2016)Real-time state estimation of the EPFL-campus medium-voltage grid by using PMUs., , , , , , , , , и 3 other автор(ы). ISGT, стр. 1-5. IEEE, (2015)Security Vulnerabilities of the Cisco IOS Implementation of the MPLS Transport Profile., , , , и . SEGS@CCS, стр. 45-50. ACM, (2014)Demonstrating data possession and uncheatable data transfer., и . IACR Cryptology ePrint Archive, (2006)