TDG
Scholar
Committed to research!
Version 1.7
Home
|
Bibliography
|
Writers
|
Journals
|
Conferences
|
Publishers
Help
|
News
Bibliography
Refine on click
|
Report
|
Share
A total of 30 records were found in 0.125 seconds
Fetch
|
Report
|
Google
Soft Computing Techniques for Dependable Cyber-Physical Systems
Muhammad Atif
,
Siddique Latif
,
Rizwan Ahmad
,
Adnan Khalid Kiani
,
Junaid Qadir
,
Adeel Baig
,
Hisao Ishibuchi
,
Waseem Abbas
CoRR
,
abs/1801.10472
,
2018
Fetch
|
Report
|
Google
Synergic security for smart water networks: redundancy, diversity, and hardening
Aron Laszka
,
Waseem Abbas
,
Yevgeniy Vorobeychik
,
Xenofon D. Koutsoukos
CySWATER@CPSWeek
,
21-24
,
2017
Fetch
|
Report
|
Google
Improving network connectivity using trusted nodes and edges
Waseem Abbas
,
Aron Laszka
,
Yevgeniy Vorobeychik
,
Xenofon D. Koutsoukos
ACC
,
328-333
,
2017
Fetch
|
Report
|
Google
Deploying Robots With Two Sensors in
K
1, 6
-Free Graphs
Waseem Abbas
,
Magnus Egerstedt
,
Chun-Hung Liu
,
Robin Thomas 0001
,
Peter Whalen
Journal of Graph Theory
,
82(3):236-252
,
2016
Fetch
|
Report
|
Google
Sensor placement for fault location identification in water networks: A minimum test cover approach
Lina Sela Perelman
,
Waseem Abbas
,
Xenofon D. Koutsoukos
,
Saurabh Amin
Automatica
,
72166-176
,
2016
Fetch
|
Report
|
Google
Vulnerability of Fixed-Time Control of Signalized Intersections to Cyber-Tampering
Amin Ghafouri
,
Waseem Abbas
,
Yevgeniy Vorobeychik
,
Xenofon D. Koutsoukos
CoRR
,
abs/1606.06698
,
2016
Fetch
|
Report
|
Google
Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments
Amin Ghafouri
,
Waseem Abbas
,
Aron Laszka
,
Yevgeniy Vorobeychik
,
Xenofon D. Koutsoukos
CoRR
,
abs/1606.06707
,
2016
Fetch
|
Report
|
Google
Graph Distances and Controllability of Networks
Ahmet Yasin Yazicioglu
,
Waseem Abbas
,
Magnus Egerstedt
CoRR
,
abs/1608.04309
,
2016
Fetch
|
Report
|
Google
Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks
Waseem Abbas
,
Aron Laszka
,
Yevgeniy Vorobeychik
,
Xenofon D. Koutsoukos
CoRR
,
abs/1608.07329
,
2016
Fetch
|
Report
|
Google
Graph Distances and Controllability of Networks
Ahmet Yasin Yazicioglu
,
Waseem Abbas
,
Magnus Egerstedt
IEEE Trans. Automat. Contr.
,
61(12):4125-4130
,
2016
Fetch
|
Report
|
Google
Optimal thresholds for intrusion detection systems
Aron Laszka
,
Waseem Abbas
,
S. Shankar Sastry
,
Yevgeniy Vorobeychik
,
Xenofon D. Koutsoukos
HotSoS
,
72-81
,
2016
Fetch
|
Report
|
Google
Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments
Amin Ghafouri
,
Waseem Abbas
,
Aron Laszka
,
Yevgeniy Vorobeychik
,
Xenofon D. Koutsoukos
GameSec
,
415-434
,
2016
Fetch
|
Report
|
Google
Efficient Complete Coverage Through Heterogeneous Sensing Nodes
Waseem Abbas
,
Xenofon D. Koutsoukos
IEEE Wireless Commun. Letters
,
4(1):14-17
,
2015
Fetch
|
Report
|
Google
Guarding Networks Through Heterogeneous Mobile Guards
Waseem Abbas
,
Sajal Bhatia
,
Xenofon D. Koutsoukos
CoRR
,
abs/1503.04473
,
2015
Fetch
|
Report
|
Google
Sensor placement for fault location identification in water networks: A minimum test cover approach
Lina Sela Perelman
,
Waseem Abbas
,
Xenofon D. Koutsoukos
,
Saurabh Amin
CoRR
,
abs/1507.07134
,
2015
Fetch
|
Report
|
Google
Database development and automatic speech recognition of isolated Pashto spoken digits using MFCC and K-NN
Zakir Ali
,
Arbab Waseem Abbas
,
T. M. Thasleema
,
Burhan Uddin
,
Tanzeela Raaz
,
Sahibzada Abdur Rehman Abid
I. J. Speech Technology
,
18(2):271-275
,
2015
Fetch
|
Report
|
Google
Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems
Waseem Abbas
,
Aron Laszka
,
Yevgeniy Vorobeychik
,
Xenofon D. Koutsoukos
CPS-SPC@CCS
,
55-66
,
2015
Fetch
|
Report
|
Google
An Efficient Approach to Fault Identification in Urban Water Networks Using Multi-Level Sensing
Waseem Abbas
,
Lina Sela Perelman
,
Saurabh Amin
,
Xenofon D. Koutsoukos
BuildSys@SenSys
,
147-156
,
2015
Fetch
|
Report
|
Google
Guarding networks through heterogeneous mobile guards
Waseem Abbas
,
Sajal Bhatia
,
Xenofon D. Koutsoukos
ACC
,
3428-3433
,
2015
Fetch
|
Report
|
Google
Network-centric methods for heterogeneous multiagent systems
Waseem Abbas
Georgia Institute of Technology, Atlanta, GA, USA
,
2014
Fetch
|
Report
|
Google
Immunization against Infection Propagation in Heterogeneous Networks
Waseem Abbas
,
Sajal Bhatia
,
Yevgeniy Vorobeychik
,
Xenofon D. Koutsoukos
NCA
,
296-300
,
2014
Fetch
|
Report
|
Google
Analyzing the Impact of MFCC and LDA for the Development of Isolated Pashto Spoken Numbers ASR
Tanzeela
,
Arbab Waseem Abbas
,
Zakir Ali
,
Burhan Uddin
FIT
,
350-354
,
2014
Fetch
|
Report
|
Google
Data mining in insurance claims (DMICS) two-way mining for extreme values
Sofia Aftab
,
Waseem Abbas
,
Muhammad Musa Bilal
,
Tauqir Hussain
,
Muhammad Shoaib
,
Syed Hamza Mehmood
ICDIM
,
1-6
,
2013
Fetch
|
Report
|
Google
Energy-efficient data collection in heterogeneous wireless sensor and actor networks
Waseem Abbas
,
Hassan Jaleel
,
Magnus Egerstedt
CDC
,
4164-4169
,
2013
Fetch
|
Report
|
Google
PHP+MySQL Based Online Examination System with Power Failure Handling and Dropbox Capability
Afzaal Ahmad
,
Noor Ullah Khan
,
Arbab Waseem Abbas
SERE (Companion)
,
21-25
,
2013
Fetch
|
Report
|
Google
A Tight Lower Bound on the Controllability of Networks with Multiple Leaders
Ahmet Yasin Yazicioglu
,
Waseem Abbas
,
Magnus Egerstedt
CoRR
,
abs/1205.3058
,
2012
Fetch
|
Report
|
Google
A tight lower bound on the controllability of networks with multiple leaders
Ahmet Yasin Yazicioglu
,
Waseem Abbas
,
Magnus Egerstedt
CDC
,
1978-1983
,
2012
Fetch
|
Report
|
Google
Distribution of agents with multiple capabilities in heterogeneous multiagent networks - A graph theoretic view
Waseem Abbas
,
Magnus Egerstedt
CDC
,
290-295
,
2012
Fetch
|
Report
|
Google
Securing multiagent systems against a sequence of intruder attacks
Waseem Abbas
,
Magnus Egerstedt
ACC
,
4161-4166
,
2012
Fetch
|
Report
|
Google
Distribution of agents in heterogeneous multiagent systems
Waseem Abbas
,
Magnus Egerstedt
CDC-ECE
,
976-981
,
2011