Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transmit Antenna Selection in the Cooperative Communication Based UWB System., and . Wirel. Pers. Commun., 94 (4): 3001-3015 (2017)On Ladder Logic Bombs in Industrial Control Systems., , and . CyberICPS/SECPRE@ESORICS, volume 10683 of Lecture Notes in Computer Science, page 110-126. Springer, (2017)Guarding the Wi-Fi 4-Way Handshake against Channel-based MiTM: A Case Study on KRACK Attack., and . CODASPY, page 147-149. ACM, (2024)Average SINR analysis of mm-wave MIMO system at 60 GHz band using first and second order moments., and . ANTS, page 1-6. IEEE, (2017)Votnet: Hybrid simulation of Virtual Operational Technology Network for Cybersecurity Assessment., , , and . WSC, page 1168-1179. IEEE, (2018)Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System., , and . AsiaCCS, page 821-823. ACM, (2018)A Novel heuristic time-domain diffraction model for UWB diffraction by lossy wedges and buildings., , , , and . Phys. Commun., (2019)Towards High-Interaction Virtual ICS Honeypots-in-a-Box., , and . CPS-SPC@CCS, page 13-22. ACM, (2016)kTRACKER: Passively Tracking KRACK using ML Model., , and . CODASPY, page 364-366. ACM, (2022)Semantic mediacasting and collaborative feed sharing., and . Dublin Core Conference, Dublin Core Metadata Initiative, (2006)