Author of the publication

Secure and Resilient Control Design for Cloud Enabled Networked Control Systems.

, and . CPS-SPC@CCS, page 31-42. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-Layer Secure and Resilient Control of Delay-Sensitive Networked Robot Operating Systems., and . CCTA, page 1712-1717. IEEE, (2018)Self-reported fever and measured temperature in emergency department records used for syndromic surveillance., , , , , , , and . JAMIA, 19 (5): 775-776 (2012)Cross-Layer Design for Secure and Resilient Cyber-Physical Systems - A Decision and Game Theoretic Approach, 3, and . Advances in Information Security Springer, (2020)Use of data mining at the Food and Drug Administration., , , , , , , , , and 20 other author(s). J. Am. Medical Informatics Assoc., 23 (2): 428-434 (2016)Analyzing User Retweet Behavior on Twitter., and . ASONAM, page 46-50. IEEE Computer Society, (2012)A cyber-physical game framework for secure and resilient multi-agent autonomous systems., and . CDC, page 5156-5161. IEEE, (2015)Secure and Resilient Control Design for Cloud Enabled Networked Control Systems., and . CPS-SPC@CCS, page 31-42. ACM, (2015)Application of change point analysis to daily influenza-like illness emergency department visits., , , , , , , and . J. Am. Medical Informatics Assoc., 19 (6): 1075-1081 (2012)Cross-layer secure cyber-physical control system design for networked 3D printers., and . ACC, page 1191-1196. IEEE, (2016)Multi-aspect query summarization by composite query., , , , , and . SIGIR, page 325-334. ACM, (2012)