Author of the publication

Security and privacy trade-offs in CPS by leveraging inherent differential privacy.

, , and . CCTA, page 1313-1318. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resilience of Process Control Systems to Cyber-Physical Attacks., and . NordSec, volume 8208 of Lecture Notes in Computer Science, page 166-182. Springer, (2013)Comparison of data forwarding mechanisms for AMI networks., , and . ISGT, page 1-8. IEEE, (2012)CPS: market analysis of attacks against demand response in the smart grid., , , and . ACSAC, page 136-145. ACM, (2014)DARIA: Designing Actuators to Resist Arbitrary Attacks Against Cyber-Physical Systems., , , and . EuroS&P, page 339-353. IEEE, (2020)B-ROC Curves for the Assessment of Classifiers over Imbalanced Data Sets., and . AAAI, page 1581-1584. AAAI Press, (2006)Understanding the physical and economic consequences of attacks on control systems., , , , , and . Int. J. Crit. Infrastructure Prot., 2 (3): 73-83 (2009)Virtual incident response functions in control systems., , , , and . Comput. Networks, (2018)Security and privacy trade-offs in CPS by leveraging inherent differential privacy., , and . CCTA, page 1313-1318. IEEE, (2017)Timing of Cyber-Physical Attacks on Process Control Systems., , and . Critical Infrastructure Protection, volume 441 of IFIP Advances in Information and Communication Technology, page 29-45. Springer, (2014)A game theory model for electricity theft detection and privacy-aware control in AMI systems., , , , and . Allerton Conference, page 1830-1837. IEEE, (2012)