Author of the publication

Networked control systems under cyber attacks with applications to power networks.

, , and . ACC, page 3690-3696. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber security analysis of state estimators in electric power systems., , , , and . CDC, page 5991-5998. IEEE, (2010)Dynamical system decomposition using dissipation inequalities., , , and . CDC/ECC, page 211-216. IEEE, (2011)Networked control systems under cyber attacks with applications to power networks., , and . ACC, page 3690-3696. IEEE, (2010)On the Confidentiality of Linear Anomaly Detector States., , , and . ACC, page 397-403. IEEE, (2019)Sequential Detection of Replay Attacks with a Parsimonious Watermarking Policy., , , and . ACC, page 4868-4875. IEEE, (2022)LiDAR-Based Topological Mapping of Orchard Environments., , and . ROBOT (2), volume 590 of Lecture Notes in Networks and Systems, page 438-450. Springer, (2022)Detection of Bias Injection Attacks on the Glucose Sensor in the Artificial Pancreas Under Meal Disturbance., , , and . ACC, page 1398-1405. IEEE, (2022)Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures., , , , and . GraMSec@FLoC, volume 11086 of Lecture Notes in Computer Science, page 31-50. Springer, (2018)Quantifying Cyber-Security for Networked Control Systems., , , and . CPSW@CISS, volume 449 of Lecture Notes in Control and Information Sciences, page 123-142. Springer, (2013)Optimal scaling of the ADMM algorithm for distributed quadratic programming., , , , and . CDC, page 6868-6873. IEEE, (2013)