Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the impact of empirical attack models targeting marine transportation., , and . MT-ITS, page 200-205. IEEE, (2017)On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts., , , and . ARES, page 22:1-22:10. ACM, (2017)A Review of Recent Advances and Security Challenges in Emerging E-Enabled Aircraft Systems., , , , , and . IEEE Access, (2019)A Big Data-Enabled Consolidated Framework for Energy Efficient Software Defined Data Centers in IoT Setups., , , , and . IEEE Trans. Ind. Informatics, 16 (4): 2687-2697 (2020)IoT Threat Detection Testbed Using Generative Adversarial Networks., , , , , and . CoRR, (2023)Helium-based IoT Devices: Threat Analysis and Internet-scale Exploitations., , , , , , and . WiMob, page 206-211. IEEE, (2023)An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph., , , , and . EuroS&P, page 144-159. IEEE, (2023)Revisiting IoT Fingerprinting behind a NAT., and . ISPA/BDCloud/SocialCom/SustainCom, page 1745-1752. IEEE, (2021)Exploiting Ransomware Paranoia For Execution Prevention., , , and . ICC, page 1-6. IEEE, (2020)On Secrecy Bounds of MIMO Wiretap Channels with ZF detectors., , , and . IWCMC, page 724-729. IEEE, (2018)