Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PowerNet: Neural Power Demand Forecasting in Smart Grid., , , , and . CoRR, (2019)End-to-End Performance Evaluation of R-SV / R-GOOSE Messages for Wide Area Protection and Control Applications., , , and . ISGT, page 1-5. IEEE, (2023)On Design and Enhancement of Smart Grid Honeypot System for Practical Collection of Threat Intelligence., , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2020)CPSS '22: 8th ACM Cyber-Physical System Security Workshop., and . AsiaCCS, page 1265-1266. ACM, (2022)F-Pro: a Fast and Flexible Provenance-Aware Message Authentication Scheme for Smart Grid., , , , and . SmartGridComm, page 1-7. IEEE, (2019)Detecting Hidden Attackers in Photovoltaic Systems Using Machine Learning., , , and . SmartGridComm, page 360-366. IEEE, (2022)Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training., , , , , and . DSN-S, page 49-55. IEEE, (2023)Electricity Theft Pinpointing Through Correlation Analysis of Master and Individual Meter Readings., , , , , and . IEEE Trans. Smart Grid, 11 (4): 3031-3042 (2020)Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training., , , , , and . CoRR, (2024)Who's Scanning Our Smart Grid? Empirical Study on Honeypot Data., , and . GLOBECOM, page 1-6. IEEE, (2019)