default search action
Takis Zourntos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [j10]Shan Liu, Bo Chen, Takis Zourntos, Deepa Kundur, Karen L. Butler-Purry:
A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid. IEEE Trans. Smart Grid 5(3): 1183-1195 (2014) - [j9]Jin Wei, Deepa Kundur, Takis Zourntos, Karen L. Butler-Purry:
A Flocking-Based Paradigm for Hierarchical Cyber-Physical Smart Grid Modeling and Control. IEEE Trans. Smart Grid 5(6): 2687-2700 (2014) - 2013
- [j8]Shan Liu, Salman Mashayekh, Deepa Kundur, Takis Zourntos, Karen L. Butler-Purry:
A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid. IEEE Trans. Emerg. Top. Comput. 1(2): 273-285 (2013) - 2012
- [c15]Jin Wei, Deepa Kundur, Takis Zourntos:
On the use of cyber-physical hierarchy for smart grid security and efficient control. CCECE 2012: 1-6 - [c14]Shan Liu, Deepa Kundur, Takis Zourntos, Karen L. Butler-Purry:
Coordinated variable structure switching in smart power systems: attacks and mitigation. HiCoNS 2012: 21-30 - [c13]Shan Liu, Deepa Kundur, Takis Zourntos, Karen L. Butler-Purry:
Coordinated variable structure switching attack in the presence of model error and state estimation. SmartGridComm 2012: 318-323 - [c12]Jin Wei, Deepa Kundur, Takis Zourntos, Karen L. Butler-Purry:
Probing the telltale physics: Towards a cyber-physical protocol to mitigate information corruption in smart grid systems. SmartGridComm 2012: 372-377 - 2011
- [j7]Robin R. Murphy, Dylan A. Shell, Amy G. Guerin, Brittany A. Duncan, Benjamin T. Fine, Kevin S. Pratt, Takis Zourntos:
A Midsummer Night's Dream (with flying robots). Auton. Robots 30(2): 143-156 (2011) - [j6]Deepa Kundur, Xianyong Feng, Salman Mashayekh, Shan Liu, Takis Zourntos, Karen L. Butler-Purry:
Towards modelling the impact of cyber attacks on a smart grid. Int. J. Secur. Networks 6(1): 2-13 (2011) - [c11]Shan Liu, Xianyong Feng, Deepa Kundur, Takis Zourntos, Karen L. Butler-Purry:
A class of cyber-physical switching attacks for power system disruption. CSIIRW 2011: 16 - [c10]Samuel Rodríguez, Jory Denny, Juan Burgos, Aditya Mahadevan, Kasra Manavi, Luke Murray, Anton Kodochygov, Takis Zourntos, Nancy M. Amato:
Toward realistic pursuit-evasion using a roadmap-based approach. ICRA 2011: 1738-1745 - 2010
- [c9]Robin R. Murphy, Vasant Srinivasan, Negar Rashidi, Brittany A. Duncan, Aaron Rice, Zachary Henkel, Marco Garza, Clifford Nass, Victoria Groom, Takis Zourntos, Roozbeh Daneshvar, Sharath Prasad:
Survivor buddy and SciGirls: affect, outreach, and questions. HRI 2010: 127-128 - [c8]Samuel Rodríguez, Jory Denny, Takis Zourntos, Nancy M. Amato:
Toward Simulating Realistic Pursuit-Evasion Using a Roadmap-Based Approach. MIG 2010: 82-93
2000 – 2009
- 2009
- [j5]Nebu John Mathai, Takis Zourntos, Deepa Kundur:
Vector Field Driven Design for Lightweight Signal Processing and Control Schemes for Autonomous Robotic Navigation. EURASIP J. Adv. Signal Process. 2009 (2009) - 2008
- [j4]Deepa Kundur, William Luh, Unoma Ndili Okorafor, Takis Zourntos:
Security and Privacy for Distributed Multimedia Sensor Networks. Proc. IEEE 96(1): 112-130 (2008) - [c7]Takis Zourntos, Nebu John Mathai, Sebastian Magierowski, Deepa Kundur:
A bio-inspired analog scheme for navigational control of lightweight autonomous agents. ICRA 2008: 1132-1137 - 2007
- [j3]William Luh, Deepa Kundur, Takis Zourntos:
A Novel Distributed Privacy Paradigm for Visual Sensor Networks Based on Sharing Dynamical Systems. EURASIP J. Adv. Signal Process. 2007 (2007) - [j2]Chad A. Marquart, Takis Zourntos, Sebastian Magierowski, Nebu John Mathai:
Sliding-Mode Amplitude Control Techniques for Harmonic Oscillators. IEEE Trans. Circuits Syst. II Express Briefs 54-II(11): 1014-1018 (2007) - [c6]Takis Zourntos, Nebu John Mathai:
A BEAM-Inspired Lyapunov-Based Strategy for Obstacle Avoidance and Target-Seeking. ACC 2007: 5302-5309 - [c5]Nebu John Mathai, Takis Zourntos:
Control-theoretic Synthesis of Hierarchical Dynamics for Embodied Cognition in Autonomous Robots. ALIFE 2007: 448-455 - 2006
- [j1]Udit Budhia, Deepa Kundur, Takis Zourntos:
Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain. IEEE Trans. Inf. Forensics Secur. 1(4): 502-516 (2006) - [c4]Bo Shen, Sunil P. Khatri, Takis Zourntos:
Implementation of MOSFET based capacitors for digital applications. ACM Great Lakes Symposium on VLSI 2006: 180-186 - 2005
- [c3]Takis Zourntos:
Oversampled encoding without delta-sigma modulation: a novel alternative based on nonlinear control. ACC 2005: 4625-4630 - 2003
- [c2]Takis Zourntos:
A 200-MHz continuous-time CMOS delta-sigma modulator featuring nonlinear feedback control. CICC 2003: 135-138
1990 – 1999
- 1998
- [c1]Takis Zourntos, David A. Johns:
Stable one-bit delta-sigma modulators based on switching control. ICASSP 1998: 1597-1600
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint