Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Don't Brick Your Car: Firmware Confidentiality and Rollback for Vehicles., , , and . ARES, page 139-148. IEEE Computer Society, (2015)Log Your Car: Reliable Maintenance Services Record., , , , and . Inscrypt, volume 10143 of Lecture Notes in Computer Science, page 484-504. Springer, (2016)A Secure Framework for Vehicle Maintenance Service using Blockchain., , and . ICSCA, page 267-272. ACM, (2023)Log Your Car: The Non-invasive Vehicle Forensics., , , , and . Trustcom/BigDataSE/ISPA, page 974-982. IEEE, (2016)Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network., , , and . UbiSec, volume 1557 of Communications in Computer and Information Science, page 131-144. Springer, (2021)Comparative Evaluation of Anomaly-Based Controller Area Network IDS., , , and . ICSCA, page 218-226. ACM, (2023)Intrusion Detection on the In-Vehicle Network Using Machine Learning., and . CRC, page 1-6. IEEE, (2021)"FoRent: vehicle forensics for car rental system"., , and . ICCSP, page 153-157. ACM, (2019)Security and privacy aspects of automotive systems.. Royal Holloway, University of London, Egham, UK, (2017)British Library, EThOS.CAN Bus Risk Analysis Revisit., , and . WISTP, volume 8501 of Lecture Notes in Computer Science, page 170-179. Springer, (2014)