Year |
Citation |
Score |
2019 |
Amin S, Johansson KH. Preface to the Focused Issue on Dynamic Games in Cyber Security Dynamic Games and Applications. 9: 881-883. DOI: 10.1007/S13235-019-00335-X |
0.329 |
|
2019 |
Wu M, Amin S. Securing Infrastructure Facilities: When Does Proactive Defense Help? Dynamic Games and Applications. 9: 984-1025. DOI: 10.1007/S13235-018-0280-8 |
0.417 |
|
2019 |
Lee AC, Dahan M, Weinert AJ, Amin S. Leveraging sUAS for Infrastructure Network Exploration and Failure Isolation Journal of Intelligent and Robotic Systems. 93: 385-413. DOI: 10.1007/S10846-018-0838-0 |
0.342 |
|
2018 |
Khan Z, Amin S. Bottleneck model with heterogeneous information Transportation Research Part B-Methodological. 112: 157-190. DOI: 10.1016/J.Trb.2018.04.003 |
0.303 |
|
2018 |
Sela L, Amin S. Robust sensor placement for pipeline monitoring: Mixed integer and greedy optimization Advanced Engineering Informatics. 36: 55-63. DOI: 10.1016/J.Aei.2018.02.004 |
0.311 |
|
2017 |
Shelar D, Amin S. Security Assessment of Electricity Distribution Networks Under DER Node Compromises Ieee Transactions On Control of Network Systems. 4: 23-36. DOI: 10.1109/Tcns.2016.2598427 |
0.382 |
|
2015 |
Amin S, Schwartz GA, Cardenas AA, Sastry SS. Game-theoretic models of electricity theft detection in smart utility networks: Providing new capabilities with advanced metering infrastructure Ieee Control Systems. 35: 66-81. DOI: 10.1109/Mcs.2014.2364711 |
0.488 |
|
2015 |
Sandberg H, Amin S, Johansson KH. Cyberphysical Security in Networked Control Systems: An Introduction to the Issue Ieee Control Systems Magazine. 35: 20-23. DOI: 10.1109/Mcs.2014.2364708 |
0.41 |
|
2015 |
Sela Perelman L, Amin S. Control of tree water networks: A geometric programming approach Water Resources Research. 51: 8409-8430. DOI: 10.1002/2014Wr016756 |
0.361 |
|
2014 |
Schwartz GA, Tembine H, Amin S, Sastry SS. Demand response scheme based on lottery-like rebates Ifac Proceedings Volumes (Ifac-Papersonline). 19: 4584-4588. DOI: 10.3182/20140824-6-Za-1003.02781 |
0.488 |
|
2014 |
Loiseau P, Schwartz G, Musacchio J, Amin S, Sastry SS. Incentive mechanisms for internet congestion management: Fixed-budget rebate versus time-of-day pricing Ieee/Acm Transactions On Networking. 22: 647-661. DOI: 10.1109/Tnet.2013.2270442 |
0.471 |
|
2014 |
Krichene W, Reilly JD, Amin S, Bayen AM. Stackelberg routing on parallel networks with horizontal queues Ieee Transactions On Automatic Control. 59: 714-727. DOI: 10.1109/Tac.2013.2289709 |
0.343 |
|
2013 |
Amin S, Litrico X, Sastry SS, Bayen AM. Cyber security of water scada systems-part II: Attack detection using enhanced hydrodynamic models Ieee Transactions On Control Systems Technology. 21: 1679-1693. DOI: 10.1109/Tcst.2012.2211874 |
0.502 |
|
2013 |
Amin S, Litrico X, Sastry S, Bayen AM. Cyber security of water scada systems-part I: Analysis and experimentation of stealthy deception attacks Ieee Transactions On Control Systems Technology. 21: 1963-1970. DOI: 10.1109/Tcst.2012.2211873 |
0.508 |
|
2013 |
Amin S, Schwartz GA, Hussain A. In quest of benchmarking security risks to cyber-physical systems Ieee Network. 27: 19-24. DOI: 10.1109/Mnet.2013.6423187 |
0.35 |
|
2013 |
Amin S, Schwartz GA, Sastry SS. Security of interdependent and identical networked control systems Automatica. 49: 186-192. DOI: 10.1016/J.Automatica.2012.09.007 |
0.527 |
|
2009 |
Huang YL, Cárdenas AA, Amin S, Lin ZS, Tsai HY, Sastry S. Understanding the physical and economic consequences of attacks on control systems International Journal of Critical Infrastructure Protection. 2: 73-83. DOI: 10.1016/J.Ijcip.2009.06.001 |
0.508 |
|
Show low-probability matches. |