Folgen
Waseem Abbas
Titel
Zitiert von
Zitiert von
Jahr
Sensor placement for fault location identification in water networks: A minimum test cover approach
LS Perelman, W Abbas, X Koutsoukos, S Amin
Automatica 72, 166-176, 2016
792016
Improving network connectivity and robustness using trusted nodes with application to resilient consensus
W Abbas, A Laszka, X Koutsoukos
IEEE Transactions on Control of Network Systems 5 (4), 2036-2048, 2018
612018
Graph Distances and Controllability of Networks
AY Yazicioglu, W Abbas, M Egerstedt
IEEE Transactions on Automatic Control, 2016
54*2016
Robust graph topologies for networked systems
W Abbas, M Egerstedt
3rd IFAC Workshop on Distributed Estimation and Control in Networked Systems …, 2012
512012
Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments Preprint Version
A Ghafouri, W Abbas, A Laszka, Y Vorobeychik, X Koutsoukos
International Conference on Decision and Game Theory for Security (GameSec), 2016
43*2016
Resilient consensus protocol in the presence of trusted nodes
W Abbas, Y Vorobeychik, X Koutsoukos
2014 7th International Symposium on Resilient Control Systems (ISRCS), 1-7, 2014
432014
Optimal Thresholds for Intrusion Detection Systems
A Laszka, W Abbas, SS Sastry, Y Vorobeychik, X Koutsoukos
3rd Annual Symposium and Bootcamp on the Science of Security (HotSoS …, 2016
392016
Effect of nonlinear load distributions on total harmonic distortion in a power system
W Abbas, MA Saqib
2007 International Conference on Electrical Engineering, 1-6, 2007
292007
Resilient Distributed Diffusion in Networks with Adversaries
J Li, W Abbas, X Koutsoukos
IEEE Transactions on Signal and Information Processing over Networks 6, 1-17, 2019
282019
A tight lower bound on the controllability of networks with multiple leaders
AY Yazicioglu, W Abbas, M Egerstedt
Decision and Control (CDC), 2012 IEEE 51st Annual Conference on, 1978-1983, 2012
272012
Deploying robots with two sensors in -free graphs
W Abbas, M Egerstedt, CH Liu, R Thomas, P Whalen
Journal of Graph Theory (http://onlinelibrary.wiley.com/doi/10.1002/jgt …, 2015
262015
MRI induced heating of artificial bone implants
SA Mohsin, NM Sheikh, W Abbas
Journal of Electromagnetic Waves and Applications 23 (5-6), 799-808, 2009
252009
Detection and mitigation of attacks on transportation networks as a multi-stage security game
A Laszka, W Abbas, Y Vorobeychik, X Koutsoukos
Computers & Security 87, 101576, 2019
212019
Vulnerability of fixed-time control of signalized intersections to cyber-tampering
A Ghafouri, W Abbas, Y Vorobeychik, X Koutsoukos
2016 Resilience Week (RWS), 130-135, 2016
212016
On the Impact of Trusted Nodes in Resilient Distributed State Estimation of LTI Systems
A Mitra, W Abbas, S Sundaram
2018 IEEE Conference on Decision and Control (CDC), 4547-4552, 2018
192018
Distribution of Agents in Heterogeneous Multi Agent Systems
W Abbas, MB Egerstedt
Georgia Institute of Technology, 2011
192011
An Efficient Approach to Fault Identification in Urban Water Networks Using Multi-Level Sensing
W Abbas, LS Perelman, S Amin, X Koutsoukos
Proceedings of the 2nd ACM International Conference on Embedded Systems for …, 2015
172015
Estimating descriptors for large graphs
ZR Hassan, M Shabbir, I Khan, W Abbas
Advances in Knowledge Discovery and Data Mining: 24th Pacific-Asia …, 2020
162020
Soft computing techniques for dependable cyber-physical systems
M Atif, S Latif, R Ahmad, AK Kiani, J Qadir, A Baig, H Ishibuchi, W Abbas
IEEE Access 7, 72030-72049, 2019
162019
Synergistic security for the Industrial Internet of Things: Integrating redundancy, diversity, and hardening
A Laszka, W Abbas, Y Vorobeychik, X Koutsoukos
2018 IEEE International Conference on Industrial Internet (ICII), 153-158, 2018
162018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20