Author of the publication

Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems.

, , , , , and . PRDC, page 125-134. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exposing Hidden Attackers in Industrial Control Systems Using Micro-Distortions., and . IEEE Trans. Smart Grid, 15 (2): 2089-2101 (2024)LoMoS: Less-Online/More-Offline Signatures for Extremely Time-Critical Systems., , , , , , , and . IEEE Trans. Smart Grid, 13 (4): 3214-3226 (2022)Enhancing Earth Observation Throughput Using Inter-Satellite Communication., , , and . IEEE Trans. Wirel. Commun., 21 (10): 7990-8006 (2022)Understanding RFID Counting Protocols., , and . IEEE/ACM Trans. Netw., 24 (1): 312-327 (2016)Hydrolysis Mechanism of the Linkers by Matrix Metalloproteinase-9 Using QM/MM Calculations., , , , , and . J. Chem. Inf. Model., 61 (10): 5203-5211 (2021)The Cost of Fault Tolerance in Multi-Party Communication Complexity., , , and . J. ACM, 61 (3): 19:1-19:64 (2014)Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems., , , , and . CoRR, (2023)MFFCN: Multi-layer Feature Fusion Convolution Network for Audio-visual Speech Enhancement., , , , and . CoRR, (2021)TransNFV: Integrating Transactional Semantics for Efficient State Management in Virtual Network Functions., , and . CoRR, (2023)VSEGAN: Visual Speech Enhancement Generative Adversarial Network., , , , , , and . CoRR, (2021)