Author of the publication

ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research.

, , and . CRITIS, volume 5141 of Lecture Notes in Computer Science, page 13-24. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Physical and Design Knowledge in the Diagnosis of Complex Industrial Systems., , , and . ECAI, page 481-495. North-Holland, (1986)Risk Assessment of Malicious Attacks Against Power Systems., , , , , and . IEEE Trans. Syst. Man Cybern. Part A, 39 (5): 1074-1085 (2009)ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research., , and . CRITIS, volume 5141 of Lecture Notes in Computer Science, page 13-24. Springer, (2007)Integrated automation program (I.A.P.) for an electronic switching system., , , and . DAC, page 144-151. ACM, (1975)Are security standards for electricity infrastructure a good choice for Europe? Evidence on cost and benefits from two case studies., and . Int. J. Crit. Infrastructures, 15 (3): 206-229 (2019)Integrating Shallow and Deep Knowledge in the Design of an On-Line Process Monitoring System., , , , and . Int. J. Man Mach. Stud., 27 (5-6): 641-664 (1987)Representing Procedural Knowledge in Expert Systems: An Application to Process Control., , , and . IJCAI, page 345-352. Morgan Kaufmann, (1985)Task dependent tools for intelligent automation., and . Artif. Intell. Eng., 4 (3): 126-143 (1989)A Diagnostic Algorithm based on Models at Different Level of Abstraction., , , and . IJCAI, page 1350-1355. Morgan Kaufmann, (1989)The security of power systems and the role of information and communication technologies: lessons from the recent blackouts., and . Int. J. Crit. Infrastructures, 4 (1/2): 32-45 (2008)