Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A class of cyber-physical switching attacks for power system disruption., , , , and . CSIIRW, page 16. ACM, (2011)On Effective Virtual Inertia of Storage-Based Distributed Control for Transient Stability., , and . IEEE Trans. Smart Grid, 10 (1): 327-336 (2019)Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 697-708. SPIE, (2005)A Class of Switching Exploits Based on Inter-Area Oscillations., , , , and . IEEE Trans. Smart Grid, 9 (5): 4659-4668 (2018)Delay in Chaum's Anonymizing Mix Networks., and . CCECE, page 1-5. IEEE, (2018)Coordinated variable structure switching in smart power systems: attacks and mitigation., , , and . HiCoNS, page 21-30. ACM, (2012)GOAliE: Goal-Seeking Obstacle and Collision Evasion for Resilient Multicast Routing in Smart Grid., and . IEEE Trans. Smart Grid, 7 (2): 567-579 (2016)On the Connectivity of Hierarchical Directional Optical Sensor Networks., and . WCNC, page 3524-3528. IEEE, (2007)A resilient feedback linearization control scheme for smart grids under cyber-physical disturbances., , and . ISGT, page 1-5. IEEE, (2015)Cyber attack detection in PMU measurements via the expectation-maximization algorithm., and . GlobalSIP, page 223-227. IEEE, (2014)