Author of the publication

Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid.

, , , and . IEEE Trans. Dependable Secur. Comput., 16 (6): 1026-1039 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid., , , and . IEEE Trans. Dependable Secur. Comput., 16 (6): 1026-1039 (2019)A first look at machine-to-machine power grid network traffic., , , and . SmartGridComm, page 884-889. IEEE, (2014)Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems., , , , and . NDSS, The Internet Society, (2016)A physical overlay framework for insider threat mitigation of power system devices., , , and . SmartGridComm, page 970-975. IEEE, (2014)An Empirical Study of TCP Vulnerabilities in Critical Power System Devices., , , and . SEGS@CCS, page 39-44. ACM, (2014)Network Based Fingerprinting Techniques for Industrial Control Systems.. Georgia Institute of Technology, Atlanta, GA, USA, (2019)base-search.net (ftgeorgiatech:oai:smartech.gatech.edu:1853/60668).A Case Study in Power Substation Network Dynamics., , and . SIGMETRICS (Abstracts), page 66. ACM, (2017)Lowering the Barriers to Industrial Control System Security with GRFICS., , and . ASE @ USENIX Security Symposium, USENIX Association, (2018)On Evaluating the Effectiveness of the HoneyBot: A Case Study., , and . CoRR, (2019)If I Knew Then What I Know Now: On Reevaluating DNP3 Security using Power Substation Traffic., , , and . ICSS, page 48-59. ACM, (2019)