Author of the publication

Detection of Malicious Threats Exploiting Clock-Gating Hardware Using Machine Learning.

, , , , , and . Sensors, 24 (3): 983 (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network., , , , and . IEEE Trans. Netw. Sci. Eng., 11 (1): 1008-1025 (January 2024)Threat Landscape Expansion During Covid-19: Remote Incident Response Handling., , , and . ISDFS, page 1-7. IEEE, (2021)Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT., , , and . IEEE Trans. Emerg. Top. Comput., 10 (3): 1476-1491 (2022)A Testbed for a Controller Area Network Communication Protocol in Automobiles., , , and . CCNC, page 1-6. IEEE, (2023)A Comprehensive Survey on Artifact Recovery from Social Media Platforms: Approaches and Future Research Directions., , , , and . Inf., 14 (12): 629 (2023)Detection of Malicious Threats Exploiting Clock-Gating Hardware Using Machine Learning., , , , , and . Sensors, 24 (3): 983 (February 2024)DPark: Decentralized Smart Private-Parking System using Blockchains., , , , , and . J. Grid Comput., 21 (3): 43 (September 2023)A Lite-SVM Based Semantic Search Model for Bigdata Analytics in Smart Cities., , , , , and . WPMC, page 272-277. IEEE, (2023)Dynamically reconfigurable AES cryptographic core for small, power limited mobile sensors., , , , and . IPCCC, page 1-7. IEEE Computer Society, (2016)Configurable Anonymous Authentication Schemes For The Internet of Things (IoT)., , , , , and . RFID, page 1-8. IEEE, (2019)