Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures., , , , , , and . IEEE Trans. Smart Grid, 5 (2): 906-915 (2014)Constraining Attacker Capabilities Through Actuator Saturation., , , , and . CoRR, (2017)Cyber-Physical Systems Attestation., , and . DCOSS, page 354-357. IEEE Computer Society, (2014)Secure Control: Towards Survivable Cyber-Physical Systems., , and . ICDCS Workshops, page 495-500. IEEE Computer Society, (2008)Delay and sampling independence of a consensus algorithm and its application to smart grid privacy., , , , and . CDC, page 1389-1394. IEEE, (2014)Privacy and customer segmentation in the smart grid., , , , and . CDC, page 2136-2141. IEEE, (2014)Quantifying the Utility-Privacy Tradeoff in the Internet of Things., , , , and . TCPS, 2 (2): 8:1-8:28 (2018)Security and Privacy in Cyber-Physical Systems: A Survey of Surveys., , , , and . IEEE Design & Test, 34 (4): 7-17 (2017)Depth-First Forwarding (DFF) in Unreliable Networks., , , , and . RFC, (June 2013)Cyber-Insurance for Cyber-Physical Systems., , and . CCTA, page 1704-1711. IEEE, (2018)