Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber-Physical Attack Conduction and Detection in Decentralized Power Systems., , , , , and . IEEE Access, (2022)Benchmark of machine learning algorithms on transient stability prediction in renewable rich power grids under cyber-attacks., , , , and . Internet Things, (April 2024)Predictive models development using gradient boosting based methods for solar power plants., and . J. Comput. Sci., (March 2023)Attack Detection and Localization in Smart Grid with Image-based Deep Learning., , , and . SmartGridComm, page 121-126. IEEE, (2021)A Real-Time Self-Healing Methodology Using Model- and Measurement-Based Islanding Algorithms., and . IEEE Trans. Smart Grid, 10 (2): 1195-1204 (2019)K-means and fuzzy relational eigenvector centrality-based clustering algorithms for defensive islanding., and . ISGT Europe, page 1-5. IEEE, (2016)Multilabel learning for the online transient stability assessment of electric power systems., , and . Turkish J. Electr. Eng. Comput. Sci., 26 (5): 2661-2675 (2018)Dynamic security assessment of a power system based on Probabilistic Neural Networks., and . ISGT Europe, page 1-6. IEEE, (2010)An optimization method for preventive control using differential evolution with consecutive search space reduction., , and . ISGT Europe, page 1-6. IEEE, (2016)Big bang-big crunch based optimal preventive control action on power systems., and . ISGT Europe, page 1-4. IEEE, (2012)