Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust stabilization via Hit-and-Run techniques., and . CCA/ISIC, page 537-541. IEEE, (2009)Distributed state estimation: a novel stopping criterion., , and . CoRR, (2020)Application of Blockchain for Secure Data Transmission in Distributed State Estimation., , , and . IEEE Trans. Control. Netw. Syst., 9 (4): 1611-1621 (2022)Anomaly Detection, Classification and Identification Tool (ADCIT)., , , , , and . Softw. Impacts, (March 2023)Geometry of the stability domain in the parameter space: D-decomposition technique., and . CDC/ECC, page 6510-6515. IEEE, (2005)Markov Chain Monte Carlo method exploiting barrier functions with applications to control and optimization., and . CACSD, page 1553-1557. IEEE, (2010)Power System Anomaly Detection and Classification Utilizing WLS-EKF State Estimation and Machine Learning., , , , , and . CoRR, (2022)Network-Level Vulnerability Assessment of Synchrophasor Measurement Devices., , , , , and . IEEE Access, (2024)COLD: Concurrent Loads Disaggregator for Non-Intrusive Load Monitoring., , and . CoRR, (2021)Optimal Energy Management for Off-Grid Hybrid System using Hybrid Optimization Technique., , and . ISGT Europe, page 1-5. IEEE, (2019)