Author of the publication

Multistage Downstream Attack Detection in a Cyber Physical System.

, , , and . CyberICPS/SECPRE@ESORICS, volume 10683 of Lecture Notes in Computer Science, page 177-185. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Synchronization and Partial Synchronization Experiments with Networks of Time-Delay Coupled Hindmarsh-Rose Neurons., , , and . I. J. Bifurcation and Chaos, 26 (7): 1-20 (2016)Learning Agents in Financial Markets: Consensus Dynamics on Volatility., , and . AAMAS, page 2106-2108. International Foundation for Autonomous Agents and Multiagent Systems Richland, SC, USA / ACM, (2018)Multistage Downstream Attack Detection in a Cyber Physical System., , , and . CyberICPS/SECPRE@ESORICS, volume 10683 of Lecture Notes in Computer Science, page 177-185. Springer, (2017)A Comparison of Stealthy Sensor Attacks on Control Systems., , and . ACC, page 973-979. IEEE, (2018)An Unknown Input Multi-Observer Approach for Estimation, Attack Isolation, and Control of LTI Systems under Actuator Attacks., , , and . ECC, page 4350-4355. IEEE, (2019)Synchronization of Identical Linear Systems and Diffusive Time-Delayed Couplings., , and . IEEE Trans. on Circuits and Systems, 61-I (6): 1801-1814 (2014)CUSUM and chi-squared attack detection of compromised sensors., and . CCA, page 474-480. IEEE, (2016)Attack Detection and Isolation for Discrete-Time Nonlinear Systems., , , and . CoRR, (2018)Constraining Attacker Capabilities Through Actuator Saturation., , , , and . ACC, page 986-991. IEEE, (2018)On Privacy of Dynamical Systems: An Optimal Probabilistic Mapping Approach., , , and . CoRR, (2019)