Author of the publication

Revealing Cascading Failure Vulnerability in Power Grids Using Risk-Graph.

, , , and . IEEE Trans. Parallel Distributed Syst., 25 (12): 3274-3284 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Synthetic Forgery Attack against Continuous Keystroke Authentication Systems., and . ICCCN, page 1-7. IEEE, (2018)Bidirectional Range Extension for TCAM-Based Packet Classification., and . Networking, volume 6091 of Lecture Notes in Computer Science, page 351-361. Springer, (2010)Double Verifiably Encrypted Signature-Based Contract Signing Protocol., , and . ICICA (LNCS), volume 6377 of Lecture Notes in Computer Science, page 86-93. Springer, (2010)A cross layer routing protocol in CRMANET., , , , and . HPSR, page 219-220. IEEE, (2013)Joint power and subcarrier allocation for multicarrier full-duplex systems., , and . ICASSP, page 6548-6552. IEEE, (2017)Scratch Analysis Tool(SAT): A Modern Scratch Project Analysis Tool based on ANTLR to Assess Computational Thinking Skills., , , and . IWCMC, page 950-955. IEEE, (2018)Monitoring the status of iBeacons with crowd sensing., , , , and . ICC, page 1-7. IEEE, (2017)Trust-aware privacy evaluation in online social networks., , , and . ICC, page 932-938. IEEE, (2014)Resource Allocation for MC-NOMA Systems with Cognitive Relaying., , and . GLOBECOM Workshops, page 1-7. IEEE, (2017)A hierarchical hashing scheme to accelerate longest prefix matching., , , and . GLOBECOM, page 1296-1302. IEEE, (2014)