Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Confidentiality of Linear Anomaly Detector States., , , and . ACC, page 397-403. IEEE, (2019)Sequential Detection of Replay Attacks with a Parsimonious Watermarking Policy., , , and . ACC, page 4868-4875. IEEE, (2022)Networked control systems under cyber attacks with applications to power networks., , and . ACC, page 3690-3696. IEEE, (2010)Cyber security analysis of state estimators in electric power systems., , , , and . CDC, page 5991-5998. IEEE, (2010)Dynamical system decomposition using dissipation inequalities., , , and . CDC/ECC, page 211-216. IEEE, (2011)LiDAR-Based Topological Mapping of Orchard Environments., , and . ROBOT (2), volume 590 of Lecture Notes in Networks and Systems, page 438-450. Springer, (2022)Detection of Bias Injection Attacks on the Glucose Sensor in the Artificial Pancreas Under Meal Disturbance., , , and . ACC, page 1398-1405. IEEE, (2022)Quantifying Cyber-Security for Networked Control Systems., , , and . CPSW@CISS, volume 449 of Lecture Notes in Control and Information Sciences, page 123-142. Springer, (2013)Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures., , , , and . GraMSec@FLoC, volume 11086 of Lecture Notes in Computer Science, page 31-50. Springer, (2018)Quickest physical watermarking-based detection of measurement replacement attacks in networked control systems., , , and . Eur. J. Control, (2023)