Author of the publication

Worst-Case Impact Assessment of Multi-Alarm Stealth Attacks Against Control Systems with CUSUM-Based Anomaly Detection.

, and . ACSOS, page 117-126. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Worst-Case Impact Assessment of Multi-Alarm Stealth Attacks Against Control Systems with CUSUM-Based Anomaly Detection., and . ACSOS, page 117-126. IEEE, (2023)Challenges in the Automated Disassembly Process of Electric Vehicle Battery Packs., , , and . ETFA, page 1-4. IEEE, (2023)Consistency Before Availability: Network Reference Point based Failure Detection for Controller Redundancy., , , and . ETFA, page 1-8. IEEE, (2023)Self-adapting Industrial Augmented Reality Applications with Proactive Dynamic Software Product Lines., , , and . ETFA, page 1-8. IEEE, (2021)LOOPS: A Holistic Control Approach for Resource Management in Cloud Computing., , , and . ICPE, page 117-124. ACM, (2021)A Genetic Algorithm Approach to Multi-Agent Mission Planning Problems., , , and . ICORES (Selected Papers), volume 1162 of Communications in Computer and Information Science, page 109-134. Springer, (2019)Partible State Replication for Industrial Controller Redundancy., , , and . ICIT, page 1-8. IEEE, (2024)Toward Sustainable Serverless Computing., , , , , and . IEEE Internet Comput., 25 (6): 42-50 (2021)Trajectory tracking and stabilisation of a riderless bicycle., , , and . ITSC, page 1859-1866. IEEE, (2021)Towards Mapping Control Theory and Software Engineering Properties using Specification Patterns., , , , , and . ACSOS-C, page 281-286. IEEE, (2021)