Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designed-in Security for Cyber-Physical Systems., , , , and . IEEE Secur. Priv., 12 (5): 9-12 (2014)A machine learning approach for packet loss prediction in science flows., , and . Future Gener. Comput. Syst., (2020)Isolating Insecurely: A Call to Arms for the Security and Privacy Community During the Time of COVID-19.. IEEE Secur. Priv., 18 (4): 4-7 (2020)Lyapunov Stability of Smart Inverters Using Linearized DistFlow Approximation., , , , , , and . CoRR, (2020)Learning Behavior of Distribution System Discrete Control Devices for Cyber-Physical Security., , , , , , , , and . IEEE Trans. Smart Grid, 11 (1): 749-761 (2020)Detecting control system misbehavior by fingerprinting programmable logic controller functionality., , , and . Int. J. Crit. Infrastructure Prot., (2019)Blockchain as a Trusted Component in Cloud SLA Verification., , , and . UCC Companion, page 93-100. ACM, (2019)Phasor Measurement Units Optimal Placement and Performance Limits for Fault Localization., , , , , , and . IEEE J. Sel. Areas Commun., 38 (1): 180-192 (2020)The IEEE Symposium on Security and Privacy, in Retrospect., , and . IEEE Secur. Priv., 12 (3): 15-17 (2014)Unsafe at Any Clock Speed: The Insecurity of Computer System Design, Implementation, and Operation.. IEEE Secur. Priv., 20 (1): 4-9 (2022)