Ali Mazloomzadeh

Learn More
—To protect large-scale power-grid critical infras-tructures, efficient security and intrusion prevention techniques are required to prevent remote adversaries from attacking the computational and data resources. Traditionally, trusted computing base solutions, i.e., a small easy-to-verify software and/or hardware component, act as the trust root for the(More)
  • 1