Author of the publication

A Virtual Synchrophasor Network for Power System Resiliency Under Concurrent DoS Attacks.

, , and . SSCI, page 1342-1349. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Compiler-Based Approach to Data Security., , , and . CC, volume 3443 of Lecture Notes in Computer Science, page 188-203. Springer, (2005)A Normalized Statistical Metric Space for Hidden Markov Models., , , , , and . IEEE Trans. Cybern., 43 (3): 806-819 (2013)Mobile Network Analysis Using Probabilistic Connectivity Matrices., , , and . IEEE Trans. Syst. Man Cybern. Part C, 37 (4): 694-702 (2007)On Bandwidth-Limited Sum-of-Games Problems., , , and . IEEE Trans. Syst. Man Cybern. Part A, 41 (2): 341-349 (2011)Inferring Statistically Significant Hidden Markov Models., , , , and . IEEE Trans. Knowl. Data Eng., 25 (7): 1548-1558 (2013)Fusion of threshold rules for target detection in wireless sensor networks., , , , , and . ACM Trans. Sens. Networks, 6 (2): 18:1-18:7 (2010)Masking the Energy Behavior of DES Encryption., , , , , , and . DATE, page 10084-10089. IEEE Computer Society, (2003)Stochastic Tools for Network Intrusion Detection., and . CoRR, (2017)Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions., , , , and . MALWARE, page 161-166. IEEE, (2018)Security experimentation using operational systems., and . CSIIRW, page 79. ACM, (2011)