Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing., , and . IEEE Internet of Things Journal, 7 (4): 2840-2854 (2020)Interdependence-Aware Game-Theoretic Framework for Secure Intelligent Transportation Systems., , and . IEEE Internet Things J., 8 (22): 16395-16405 (2021)Resilient critical infrastructure: Bayesian network analysis and contract-Based optimization., , and . Reliab. Eng. Syst. Saf., (2021)Contract-Theoretic Resource Allocation for Critical Infrastructure Protection., , , and . GLOBECOM, page 1-6. IEEE, (2015)On the cybersecurity of m-Health IoT systems with LED bitslice implementation., and . ICCE, page 1-6. IEEE, (2018)Finding the Sweet Spot for Data Anonymization: A Mechanism Design Perspective., , , and . IEEE Access, (2022)Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing., , and . CoRR, (2019)Contract-Theoretic Resource Allocation for Critical Infrastructure Protection., , , and . CoRR, (2017)Single controller stochastic games for optimized moving target defense., , and . ICC, page 1-6. IEEE, (2016)Open Source Horizontal IoT Platforms: A Comparative Study on Functional Requirements., , , , and . CoRR, (2022)