Author of the publication

Trust-Awareness to Secure Swarm Intelligence from Data Injection Attack.

, , , and . ICC, page 1406-1412. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Industrial Wireless Networks: Enhancing SDN with PhySec., , and . NextComp, page 1-7. IEEE, (2019)Status-preserving, Seamless Relocation of Processes in Orchestrated Networks such as Organic 6G., and . ICPS, page 1-8. IEEE, (2022)Digital Twin Development: Mathematical Modeling., , , and . ICPS, page 1-8. IEEE, (2023)Radio Resource Sharing in 6G Private Networks: Trustworthy Spectrum Allocation for Coexistence through DLT as Core Function., , , and . 6GNet, page 1-8. IEEE, (2022)Deterministic Planning for Flexible Intralogistics., , , and . ICAC, page 1-6. IEEE, (2021)The Dos and Don'ts of Industrial Network Simulation: A Field Report., , , , , and . CoRR, (2019)Trust-Awareness to Secure Swarm Intelligence from Data Injection Attack., , , and . ICC, page 1406-1412. IEEE, (2023)Unified Multi-Modal Data Aggregation for Complementary Sensor Networks Applied for Localization., , , and . VTC Spring, page 1-7. IEEE, (2022)Massive Twinning to Enhance Emergent Intelligence., , , and . ISCC, page 1-4. IEEE, (2022)Proof of Concept for IoT Device Authentication Based on SRAM PUFs Using ATMEGA 2560-MCU., , , , and . ICDIS, page 36-42. IEEE, (2018)