Author of the publication

Vulnerabilities in Lagrange-Based DMPC in the Context of Cyber-Security.

, , , and . ICAC, page 215-220. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Application of the Logarithmic Mean Divisia Index Method for Predictive Control Schemes to a Power Flow Network., , and . ACC, page 3243-3248. IEEE, (2019)Mobile Personal Health Monitoring for Automated Classification of Electrocardiogram Signals in Elderly., , , , , , , and . Comp. Math. Methods in Medicine, (2018)Scenario-based defense mechanism for distributed model predictive control., , , and . CDC, page 6171-6176. IEEE, (2017)Vulnerabilities in Lagrange-Based DMPC in the Context of Cyber-Security., , , and . ICAC, page 215-220. IEEE Computer Society, (2017)Application of robust model predictive control to a renewable hydrogen-based microgrid., , , and . ECC, page 1209-1214. IEEE, (2016)An unsupervised approach for traffic trace sanitization based on the entropy spaces., , , , and . Telecommunication Systems, 61 (3): 609-626 (2016)Detecting anomalies in network traffic using the method of remaining elements., , , and . IEEE Communications Letters, 13 (6): 462-464 (2009)Detecting anomalies in network traffic using Entropy and Mahalanobis distance., , and . CONIELECOMP, page 86-91. IEEE, (2012)Security Enhancement on Li-Lee's Remote User Authentication Scheme Using Smart Card., , and . Computación y Sistemas, (2014)P2PM-pay: Person to Person Mobile Payment Scheme Controlled by Expiration Date., , , and . Wireless Personal Communications, 85 (1): 289-304 (2015)