From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attacker Placement for Detecting Vulnerabilities of Pseudonym Change Strategies in VANET., , и . VTC Fall, стр. 1-5. IEEE, (2018)Traffic Density Based Distributed Congestion Control Strategy for Vehicular Communication., , , и . DCOSS, стр. 195-197. IEEE, (2019)Intelligent Adversary Placements for Privacy Evaluation in VANET., , и . Inf., 11 (9): 443 (2020)Identifying Vulnerabilities and Attacking Capabilities Against Pseudonym Changing Schemes in VANET., , и . ISDDC, том 11317 из Lecture Notes in Computer Science, стр. 1-15. Springer, (2018)A comprehensive pseudonym changing scheme for improving location privacy in vehicular networks., , и . Internet Things, (2022)Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey., , , , , , и . Peer Peer Netw. Appl., 16 (5): 2153-2185 (сентября 2023)Decentralized congestion control algorithm for vehicular networks using oscillating transmission power., , и . WTS, стр. 1-5. IEEE, (2017)A Comprehensive Review of Pseudonym Changing Strategies in Vehicular Networks., , и . Int. J. Netw. Secur., 21 (5): 785-796 (2019)Secure Identity Management Framework for Vehicular Ad-hoc Network using Blockchain., , и . ISCC, стр. 1-6. IEEE, (2020)A Context Aware and Traffic Adaptive Privacy Scheme in VANETs., , и . CAVS, стр. 1-5. IEEE, (2020)