Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Area of Interest Coverage in Surveillance Mobile Sensor Networks., , and . IWQoS, page 87-90. IEEE, (2007)Handling High-Bandwidth Traffic Aggregates by Receiver-Driven Feedback Control., , , and . COMPSAC (2), page 143-145. IEEE Computer Society, (2005)0-7695-2413-3.On False Data Injection Attacks Against Railway Traction Power Systems., , , , and . DSN, page 383-394. IEEE Computer Society, (2016)Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems., , , and . CoRR, (2017)A sensor-cyber network testbed for plume detection, identification, and tracking., , , , , , , , and . IPSN, page 541-542. ACM, (2007)Coverage in Wireless Sensor Networks., , , , , , , and . Guide to Wireless Sensor Networks, Springer, (2009)Cyber-Physical Correlation Effects in Defense Games for Large Discrete Infrastructures., , , , and . Games, 9 (3): 52 (2018)Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems., , , and . IEEE Trans. Dependable Sec. Comput., 9 (5): 741-755 (2012)Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation., , , and . e-Energy, page 179-190. ACM, (2017)Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure., , , , , , and . WISEC, page 160-171. ACM, (2018)