Author of the publication

Using Authenticated Encryption for Securing Controller Area Networks in Autonomous Mobile Platforms.

, , , , , and . WPMC, page 76-82. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Connotation of Unconventional Drones for Agricultural Applications with Node Arrangements Using Neural Networks., , , , , and . VTC Fall, page 1-6. IEEE, (2022)Routing Protocol Security for Low-Power and Lossy Networks in the Internet of Things., , , and . BDA, volume 13147 of Lecture Notes in Computer Science, page 133-145. Springer, (2021)AoI Optimization for UAV-aided MEC Networks under Channel Access Attacks: A Game Theoretic Viewpoint., , , , , , and . ICC, page 1-6. IEEE, (2022)A Machine Learning Driven Threat Intelligence System for Malicious URL Detection., , , , and . ARES, page 154:1-154:7. ACM, (2021)Making Sense of Blockchain for AI Deepfakes Technology., , , and . GLOBECOM (Workshops), page 1-6. IEEE, (2020)An Empirical Evaluation of AI Deep Explainable Tools., , , , and . GLOBECOM (Workshops), page 1-6. IEEE, (2020)Where's @Waldo?: Finding Users on Twitter., , , and . ICAISC (2), volume 11509 of Lecture Notes in Computer Science, page 338-349. Springer, (2019)Generative Ensemble Learning for Mitigating Adversarial Malware Detection in IoT., , and . ICNP, page 1-5. IEEE, (2021)A Blockchain Based Cloud Integrated IoT Architecture Using a Hybrid Design., , , , and . CollaborateCom (2), volume 350 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 550-559. Springer, (2020)Blockchain Based Secure Communication for IoT Devices in Smart Cities., , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 1-7. IEEE, (2022)