Author of the publication

How to secure autonomous mobile robots? An approach with fuzzing, detection and mitigation.

, , , , and . J. Syst. Archit., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Situation evaluate on hierarchical network security based on D-S evidence theory., and . Int. J. Commun. Networks Distributed Syst., 13 (3/4): 245-256 (2014)Situation prediction of large-scale Internet of Things network security., , , and . EURASIP J. Information Security, (2019)LAWN: boosting the performance of NVMM file system through reducing write amplification., and . DAC, page 6:1-6:6. ACM, (2018)A Rule-Based Ontology for Context-Aware Computing., , , and . BMEI, page 1-4. IEEE, (2009)Persisting RB-Tree into NVM in a Consistency Perspective., , , , , , , , and . ACM Trans. Storage, 14 (1): 6:1-6:27 (2018)How to secure autonomous mobile robots? An approach with fuzzing, detection and mitigation., , , , and . J. Syst. Archit., (2021)A novel personality detection method based on high-dimensional psycholinguistic features and improved distributed Gray Wolf Optimizer for feature selection., , and . Inf. Process. Manag., 60 (2): 103217 (2023)AisLSM: Revolutionizing the Compaction with Asynchronous I/Os for LSM-tree., , , and . CoRR, (2023)STITCHER: Correlating Digital Forensic Evidence on Internet-of-Things Devices., , and . CoRR, (2020)An improved kNN text classification method., , and . Int. J. Comput. Sci. Eng., 20 (3): 397-403 (2019)