Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A formal model for verifying stealthy attacks on state estimation in power grids., , and . SmartGridComm, page 414-419. IEEE, (2013)A declarative approach for global network security configuration verification and evaluation., and . Integrated Network Management, page 531-538. IEEE, (2011)Formal synthesis of dependable configurations for advanced metering infrastructures., and . SmartGridComm, page 289-294. IEEE, (2015)A game-theoretic approach for deceiving Remote Operating System Fingerprinting., , and . CNS, page 73-81. IEEE, (2013)Blockchain-based Privacy-Preserving Charging Coordination Mechanism for Energy Storage Units., , , , , and . CoRR, (2018)FAKEY: Fake Hashed Key Attack on Payment Channel Networks., , and . CNS, page 1-9. IEEE, (2023)On the Feasibility of Sybil Attacks in Shard-Based Permissionless Blockchains., , , , and . CoRR, (2020)A formal model for sustainable vehicle-to-grid management., , and . SEGS@CCS, page 81-92. ACM, (2013)Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile Ad-Hoc Network., , , and . COMPSAC (1), page 548-556. IEEE Computer Society, (2017)Optimal Improvement of Post-Disturbance Dynamic Response in Power Grids., , and . IAS, page 1-5. IEEE, (2022)