Author of the publication

Unsupervised Machine Learning for Drone Forensics through Flight Path Analysis.

, , , , and . ISDFS, page 1-6. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Industrial Control Systems (ICS) Through Attack Modelling and Rule-Based Learning., , and . COMSNETS, page 598-602. IEEE, (2024)Tracing Software Exploitation., , , and . NSS, volume 13041 of Lecture Notes in Computer Science, page 340-352. Springer, (2021)Timestamp Analysis for Quality Validation of Network Forensic Data., and . NSS, volume 9955 of Lecture Notes in Computer Science, page 235-248. Springer, (2016)LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)., , , , , and . Comput. Secur., (2021)An informed consent model for managing the privacy paradox in smart buildings., , , and . ASE Workshops, page 19-26. ACM, (2020)An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic., , , and . CW, page 23-30. IEEE Computer Society, (2011)A Pattern Recognition Scheme for Distributed Denial of Service (DDoS) Attacks in Wireless Sensor Networks., , and . ICPR (3), page 1050-1054. IEEE Computer Society, (2006)Evaluation and Analysis of a Digital Forensic Readiness Framework for the IIoT., , , and . ISDFS, page 1-6. IEEE, (2024)Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments., , , , , , , and . ARES, page 145:1-145:11. ACM, (2024)Internet of Things (IoT): Research, Simulators, and Testbeds., , , and . IEEE Internet of Things Journal, 5 (3): 1637-1647 (2018)