Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Context based Detections against Legal False Price Data and Malicious Disconnect Commands in Smart Grid., , and . ICCSA (6), page 1-9. IEEE, (2018)A Novel Dynamic Channel Assembling Strategy in Cognitive Radio Networks With Fine-Grained Flow Classification., , , , and . IEEE Internet Things J., 9 (20): 19599-19614 (2022)A Collaborative Intrusion Detection Mechanism Against False Data Injection Attack in Advanced Metering Infrastructure., , , and . IEEE Trans. Smart Grid, 6 (5): 2435-2443 (2015)Successive direct load altering attack in smart grid., , , and . Comput. Secur., (2018)CPMTD: Cyber-physical moving target defense for hardening the security of power system against false data injected attack., , , , , , and . Comput. Secur., (2021)A Self-Powered Hybrid SSHI Circuit with a Wide Operation Range for Piezoelectric Energy Harvesting., , and . Sensors, 21 (2): 615 (2021)Multidimensional Trust-Based Anomaly Detection System in Internet of Things., , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 302-313. Springer, (2017)PR-MAC: Path-Oriented Real-Time MAC Protocol for Wireless Sensor Network., , and . ICESS, volume 4523 of Lecture Notes in Computer Science, page 530-539. Springer, (2007)Social recommendation using quantified social tie strength., , and . ICACI, page 84-88. IEEE, (2015)A Fast Traffic Planning Algorithm in Lifetime Optimization of Sensor Networks., , , , and . UIC, volume 4159 of Lecture Notes in Computer Science, page 457-467. Springer, (2006)