Author of the publication

Faulty or Malicious Anchor Detection Criteria for Distance-Based Localization

, , , , and . International Conference on Critical Information Infrastructures Security, page 229--240. Springer, Cham, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An amendment to "Distributed synchronization under uncertainty: A fuzzy approach", , and . Fuzzy Sets and Systems, (2013)Fuzzy Input-Output Inoperability Model, , and . Critical Information Infrastructure Security, Springer Berlin Heidelberg, (2013)Network Defensive Strategy Definition Based on Node Criticality., , and . SMC, page 439-444. IEEE, (2019)Distributed opinion dynamics with heterogeneous reputation., , and . Int. J. Syst. Syst. Eng., 4 (3/4): 277-290 (2013)An amendment to “Distributed synchronization under uncertainty: A fuzzy approach”, , and . Fuzzy Sets and Systems, (2014)Agent-based input--output interdependency model, , and . International Journal of Critical Infrastructure Protection, 3 (2): 76--82 (2010)Modeling real networks with deterministic preferential attachment, and . Control & Automation (MED), 2011 19th Mediterranean Conference on, page 13--18. IEEE, (2011)Fuzzy dynamic input--output inoperability model, , and . International Journal of Critical Infrastructure Protection, 4 (3-4): 165--175 (2011)Characterising failures and attacks in average consensus, , , and . International Journal of Systems, Control and Communications, 6 (1): 1--19 (2014)Characterization of protein--protein interfaces through a protein contact network approach, , , , , and . Frontiers in bioengineering and biotechnology, (2015)