Author of the publication

Limiting the Impact of Stealthy Attacks on Industrial Control Systems.

, , , , , , , , and . ACM Conference on Computer and Communications Security, page 1092-1105. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation., , , and . IEEE Journal on Selected Areas in Communications, 30 (6): 1108-1118 (2012)Approximative model reconstruction of cascade systems., , and . Systems & Control Letters, (2014)Consistency-preserving event-triggered estimation in sensor networks., , and . CDC, page 7494-7501. IEEE, (2015)Deriving thermodynamics from linear dissipativity theory., and . CDC, page 537-542. IEEE, (2015)Demand response for aggregated residential consumers with energy storage sharing., , , and . CDC, page 2024-2030. IEEE, (2015)Quantifying Cyber-Security for Networked Control Systems., , , and . CPSW@CISS, volume 449 of Lecture Notes in Control and Information Sciences, page 123-142. Springer, (2013)Optimal state estimation with measurements corrupted by Laplace noise., , and . CDC, page 302-307. IEEE, (2016)Stability analysis of multiple state-based schedulers with CSMA., , and . CDC, page 7205-7211. IEEE, (2012)An axiomatic fluid-flow model for congestion control analysis., , , , , , and . CDC-ECE, page 3122-3129. IEEE, (2011)Nonlinear state-dependent delay modeling and stability analysis of internet congestion control., , , , , and . CDC, page 1484-1491. IEEE, (2010)