Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Edge-Based Detection and Localization of Adversarial Oscillatory Load Attacks Orchestrated By Compromised EV Charging Stations., , , , and . CoRR, (2023)A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security., , , , , and . IEEE Secur. Priv., 21 (4): 74-83 (July 2023)A Real-Time Co-simulation Testbed for EV Charging and Smart Grid Security., , , , , and . CoRR, (2023)Quality of Service Evaluation and Forecast for EV Charging Based on Real-World Data., , , , , , and . WiMob, page 280-285. IEEE, (2023)Investigating the Security of EV Charging Mobile Applications As an Attack Surface., , , , and . CoRR, (2022)A Data-Driven Framework for Improving Public EV Charging Infrastructure: Modeling and Forecasting., , , , , , and . CoRR, (2023)A framework for mobile relay node selection for serving outdoor cell edge users., , , and . Comput. Networks, (2020)An Opportunistic Vehicle-Based Task Assignment for IoT offloading., , and . Comput. Networks, (2022)Investigating the Security of EV Charging Mobile Applications as an Attack Surface., , , , and . ACM Trans. Cyber Phys. Syst., 7 (4): 26:1-26:28 (October 2023)On Ransomware Family Attribution Using Pre-Attack Paranoia Activities., , , , , and . IEEE Trans. Netw. Serv. Manag., 19 (1): 19-36 (2022)