Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Diversity of cascading failure processes in electrical grids., , , , and . ISGT, page 1-5. IEEE, (2015)Probabilistic ranking of multi-attribute items using indifference curve., , and . ICASSP, page 6132-6136. IEEE, (2014)Attacks on Trust Evaluation in Distributed Networks., , , and . CISS, page 1461-1466. IEEE, (2006)Trust Establishment in Distributed Networks: Analysis and Modeling., and . ICC, page 1266-1273. IEEE, (2007)Trust sensor interface for improving reliability of EMG-based user intent recognition., , , and . EMBC, page 7516-7520. IEEE, (2011)Coordinated attacks against substations and transmission lines in power grids., , , , and . GLOBECOM, page 655-661. IEEE, (2014)Signal Processing and the Internet of Things From the Guest Editors., , , and . IEEE Signal Process. Mag., 35 (5): 13-15 (2018)Fast Learning of Relational Dependency Networks, , , , and . CoRR, (2014)Extended version of the version presented at the Intenatinal Conference on Inductive Logic Programming (ILP-2014).Predictability trust for Wireless Sensor Networks to provide a defense against On/off attack., , and . CollaborateCom, page 406-415. ICST / IEEE, (2012)Modeling Attack Behaviors in Rating Systems., , , and . ICDCS Workshops, page 241-248. IEEE Computer Society, (2008)