Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging Software-Defined Networking for Incident Response in Industrial Control Systems., , , , and . IEEE Software, 35 (1): 44-50 (2018)Resilient Operating Constraints for Power Distribution Systems under Setpoint Attacks., and . CDC, page 7180-7185. IEEE, (2022)SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants., , , , , and . USENIX Security Symposium, page 895-912. USENIX Association, (2020)Dynamic Sensor Processing for Securing Unmanned Vehicles., , , and . DDDAS, volume 12312 of Lecture Notes in Computer Science, page 253-261. Springer, (2020)Real-Time Cyber-Physical Analysis of Distribution Systems Using Digital Twins., , and . SmartGridComm, page 34-39. IEEE, (2022)The more the merrier: adding hidden measurements to secure industrial control systems., , , and . HotSoS, page 3:1-3:10. ACM, (2020)Virtual incident response functions in control systems., , , , and . Comput. Networks, (2018)Constraining Attacker Capabilities Through Actuator Saturation., , , , and . ACC, page 986-991. IEEE, (2018)Adversarial Classification Under Differential Privacy., , , and . NDSS, The Internet Society, (2020)IoT-Enabled Decentralized Moving Target Defense for Enhancing Privacy in Microgrid Control., and . ISGT, page 1-5. IEEE, (2022)