Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Universality of Christ. G.H. Doran, New York, NY, (1922)Data-driven evaluation of building demand response capacity., , , and . SmartGridComm, page 541-547. IEEE, (2014)The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment., , , , , , , and . GraMSec@CSF, volume 9987 of Lecture Notes in Computer Science, page 39-61. Springer, (2016)Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems., , , , , and . PRDC, page 125-134. IEEE, (2018)Systems-Theoretic Likelihood and Severity Analysis for Safety and Security Co-engineering., , , and . RSSRail, volume 10598 of Lecture Notes in Computer Science, page 51-67. Springer, (2017)Reconciling Systems-Theoretic and Component-Centric Methods for Safety and Security Co-analysis., , , and . SAFECOMP Workshops, volume 10489 of Lecture Notes in Computer Science, page 87-93. Springer, (2017)Monotonic marginal pricing: demand response with price certainty., and . SIGMETRICS Perform. Evaluation Rev., 41 (3): 65-70 (2013)Developing Models for Physical Attacks in Cyber-Physical Systems., , , , , and . CPS-SPC@CCS, page 49-55. ACM, (2017)On Train Automatic Stop Control Using Balises: Attacks and a Software-Only Countermeasure., , , , and . PRDC, page 274-283. IEEE Computer Society, (2017)Enhancing Anomaly Diagnosis of Automatic Train Supervision System Based on Operation Log., , , , , and . DSN Workshops, page 133-136. IEEE Computer Society, (2017)