Author of the publication

Medium access scheduling for input reconstruction under deception attacks.

, , and . J. Frankl. Inst., 354 (9): 3678-3689 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security challenges in autonomous vehicles: a case study of Camera and LiDAR sensors., , and . ATSIP, page 212-217. IEEE, (2024)Medium access scheduling for input reconstruction under deception attacks., , and . J. Frankl. Inst., 354 (9): 3678-3689 (2017)Identification of the dynamic parameters of the planar robot model at 2 degrees of freedom using the least squares method., , , , and . ATSIP, page 1-5. IEEE, (2022)High level Petri nets-based proposal of an integrated intrusion detection and prevention mechanism in network controlled systems., , and . IET Commun., 17 (4): 469-477 (March 2023)Fault Detection and Diagnosis for Building Systems: New Challenges., , , , and . SSD, page 832-837. IEEE, (2018)State Filtering for Networked Control Systems Subject to Switching Disturbances., , , and . Int. J. Appl. Math. Comput. Sci., 28 (3): 473-482 (2018)Resilient Control for Networked Control Systems Subject to Cyber/Physical Attacks., , and . Int. J. Autom. Comput., 15 (3): 345-354 (2018)Design of faults detection synergetic observer., , , and . MED, page 19-24. IEEE, (2016)Synergetic Theory for Observation of Triangular Systems., , and . SSD, page 548-553. IEEE, (2018)Determining the Dynamic Parameters of a Robot Using the Method of Instrument Variables., , and . SSD, page 184-189. IEEE, (2023)