Author of the publication

Blue Skies: A Methodology for Data-Driven Clear Sky Modelling.

, , , and . IJCAI, page 3777-3783. ijcai.org, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardening Critical Infrastructure Networks Against Attacker Reconnaissance., and . QEST, volume 12289 of Lecture Notes in Computer Science, page 258-275. Springer, (2020)Fusing Sensors for Occupancy Sensing in Smart Buildings., , , , , , and . ICDCIT, volume 8956 of Lecture Notes in Computer Science, page 73-92. Springer, (2015)Extensions of Network Reliability Analysis., , and . DSN, page 88-99. IEEE, (2019)Invisible and forgotten: Zero-day blooms in the IoT., , and . PerCom Workshops, page 1-6. IEEE Computer Society, (2016)Optimal Monitoring Strategies for Critical Infrastructure Networks., and . SIGMETRICS Perform. Evaluation Rev., 47 (4): 4-7 (2020)An Approach to Incorporating Uncertainty in Network Security Analysis., , and . HotSoS, page 74-84. ACM, (2017)I Am Joe's Fridge: Scalable Identity in the Internet of Things., , , and . iThings/GreenCom/CPSCom/SmartData, page 129-135. IEEE, (2016)PhasorSec: Protocol Security Filters for Wide Area Measurement Systems., , , , , and . SmartGridComm, page 1-6. IEEE, (2018)Scalable Identity and Key Management for Publish-Subscribe Protocols in the Internet-of-Things., , and . IOT, page 12:1-12:7. ACM, (2019)Putting smart meters to work: beyond the usual., , , , , and . e-Energy, page 237-238. ACM, (2014)