James Obert

Orcid: 0000-0001-5066-1745

According to our database1, James Obert authored at least 16 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Efficient Distributed Energy Resource Voltage Control Using Ensemble Deep Reinforcement Learning.
Int. J. Semantic Comput., June, 2023

2022
Efficient Binary Static Code Data Flow Analysis Using Unsupervised Learning.
Int. J. Semantic Comput., 2022

Cyberphysical Security of Grid Battery Energy Storage Systems.
IEEE Access, 2022

Efficient DER Voltage Control Using Ensemble Deep Reinforcement Learning.
Proceedings of the 5th International Conference on Artificial Intelligence for Industries, 2022

2021
Optimizing Dynamic Timing Analysis and Reinforcement Learning.
Proceedings of the IEEE Intl Conf on Dependable, 2021

2020
Graph Theory and Classifying Security Events in Grid Security Gateways.
Int. J. Semantic Comput., 2020

Distributed renewable energy resource trust metrics and secure routing.
Comput. Secur., 2020

Graph Theory and IC Component Design Analysis.
Proceedings of the Third International Conference on Artificial Intelligence for Industries, 2020

2019
ASIC STA Path Verification Using Semi-Supervised Learning.
Int. J. Semantic Comput., 2019

Graph-Based Event Classification in Grid Security Gateways.
Proceedings of the Second International Conference on Artificial Intelligence for Industries, 2019

2018
Behavioral Based Trust Metrics and the Smart Grid.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Semi-Supervised Learning and ASIC Path Verification.
Proceedings of the First International Conference on Artificial Intelligence for Industries, 2018

2016
Proactively applied encryption in multipath networks.
Comput. Secur., 2016

2014
Dynamically Differentiated Multipath Security in Fixed Bandwidth Networks.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

2013
Determination of Multipath Security Using Efficient Pattern Matching.
CoRR, 2013

2012
Utilizing linear subspaces to improve cloud security.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012


  Loading...