Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile applications for connected cars: Security analysis and risk assessment., and . NOMS, page 1-6. IEEE, (2022)TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks., , and . IEEE Access, (2018)DeepDist: A Deep-Learning-Based IoV Framework for Real-Time Objects and Distance Violation Detection., , , , , and . IEEE Internet Things Mag., 3 (3): 30-34 (2020)Enhancing QoS in Privacy Based Vehicular Communication., , , , and . Ad Hoc Sens. Wirel. Networks, 52 (3-4): 273-295 (2022)On the Use of Blockchain Technology for Education During Pandemics., , , , and . IT Prof., 24 (2): 52-61 (2022)Evaluating the impact of generative adversarial models on the performance of anomaly intrusion detection., , and . IET Networks, 13 (1): 28-44 (January 2024)On the Design, Development and Implementation of Trust Evaluation Mechanism in Vehicular Networks., , , , and . AICCSA, page 1-7. IEEE Computer Society, (2019)Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers' Strategies., , , , and . Sensors, 18 (11): 4040 (2018)Privacy and Trust in Smart Camera Sensor Networks., and . ARES, page 244-248. IEEE Computer Society, (2015)Vehicular Cloud Networks: Architecture, Applications and Security Issues., , , and . UCC, page 571-576. IEEE Computer Society, (2015)