Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CPES-QSM: A Quantitative Method Toward the Secure Operation of Cyber-Physical Energy Systems., , and . IEEE Internet Things J., 10 (9, May 1): 7577-7590 (2023)Detection of Malicious Attacks in Autonomous Cyber-Physical Inverter-Based Microgrids., and . IEEE Trans. Ind. Informatics, 18 (9): 5815-5826 (2022)Process-Aware Attacks on Medication Control of Type-I Diabetics Using Infusion Pumps., , , and . IEEE Syst. J., 17 (2): 1831-1842 (June 2023)A Modular End-to-End Framework for Secure Firmware Updates on Embedded Systems., , and . ACM J. Emerg. Technol. Comput. Syst., 18 (1): 3:1-3:19 (2022)Experimental Impact Analysis of Cyberattacks in Power Systems using Digital Real-Time Testbeds., , , and . CoRR, (2023)Cyber-Physical Energy Systems Security: Threat Modeling, Risk Assessment, Resources, Metrics, and Case Studies., , , and . CoRR, (2021)CPES-QSM: A Quantitative Method Towards the Secure Operation of Cyber-Physical Energy Systems., , and . CoRR, (2022)A Secure and Trusted Mechanism for Industrial IoT Network using Blockchain., , , and . CoRR, (2022)Cybersecurity for the Smart Grid., and . Computer, 53 (5): 10-12 (2020)Physics-Informed Neural Networks for Securing Water Distribution Systems., , and . CoRR, (2020)