Author of the publication

Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster).

, , , and . SIN, page 492. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The productivity effects of local R&D outsourcing: the moderating role of subsidiary mandate and internal R&D., , and . Technol. Anal. Strateg. Manag., 27 (10): 1239-1254 (2015)GIS in urban cultural studies: reflections from the project on Republican Beijing., , , and . Ann. GIS, 18 (1): 81-92 (2012)StenUNet: Automatic Stenosis Detection from X-ray Coronary Angiography., , , and . CoRR, (2023)DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing., , , , and . Future Gener. Comput. Syst., (2018)Content and Behaviour Based Metrics for Crowd Truth., , , , , and . CrowdSem, volume 1030 of CEUR Workshop Proceedings, page 45-58. CEUR-WS.org, (2013)Tree-Based Covariance Modeling of Hidden Markov Models., , , and . IEEE Trans. Speech Audio Process., 14 (6): 2134-2146 (2006)Reflections and speculations on the progress in Geographic Information Systems (GIS): a geographic perspective., , , , , and . Int. J. Geogr. Inf. Sci., 33 (2): 346-367 (2019)A Secure Cooperative Spectrum Sensing Strategy for Distributed Cognitive Radio Networks., , , and . CIT/IUCC/DASC/PICom, page 2198-2205. IEEE, (2015)Shadow detection in very high-resolution satellite images by extended random walker., , , , and . IGARSS, page 3775-3778. IEEE, (2017)Polyphase speech recognition., and . ICASSP, page 4109-4112. IEEE, (2008)