Author of the publication

ACM SIGMETRICS International Workshop on Critical Infrastructure Network Security.

, , and . SIGMETRICS Perform. Evaluation Rev., 46 (2): 48-49 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification of the K-most Vulnerable Entities in a Smart Grid System., and . CommNet, page 1-6. IEEE, (2020)On an optimal algorithm for channel assignment in cellular networks., , and . ICC, page 1147-1151. IEEE, (1999)The transformation of the k-Shortest Steiner trees search problem into binary dynamic problem for effective evolutionary methods application., , , , and . Inf. Sci., (2019)ACM SIGMETRICS International Workshop on Critical Infrastructure Network Security., , and . SIGMETRICS Perform. Evaluation Rev., 46 (2): 48-49 (2018)A Social Identity Approach to Identify Familiar Strangers in a Social Network., , , , and . ICWSM, The AAAI Press, (2009)On the smallest pseudo target set identification problem for targeted attack on interdependent power-communication networks., , , , and . MILCOM, page 1015-1020. IEEE, (2015)On Some Topological Properties of Hypercube, Incomplete Hypercube and Supercube., , and . IPPS, page 636-642. IEEE Computer Society, (1993)Fair queuing with round robin: a new packet scheduling algorithm for routers., , , and . ISCC, page 1001-1006. IEEE Computer Society, (2002)Influence Propagation in Competitive Scenario: Winning with Least Amount of Investment in Separated Threshold Model., and . CDC, page 5221-5226. IEEE, (2018)Domain-Invariant Feature Alignment Using Variational Inference for Partial Domain Adaptation., , , and . IEEECONF, page 349-355. IEEE, (2022)