Author of the publication

MAVLink Protocol for Unmanned Aerial Vehicle: Vulnerabilities Analysis.

, , , and . DASC/PiCom/CBDCom/CyberSciTech, page 1-6. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacking a packet Analyzer: Caronte case study., , and . CSR, page 269-274. IEEE, (2023)Semi-Automatic PenTest Methodology based on Threat-Model: The IoT Brick Case Study., , and . CloudCom, page 232-237. IEEE, (2023)Threat Modeling of Edge-Based IoT Applications., , , and . QUATIC, volume 1439 of Communications in Computer and Information Science, page 282-296. Springer, (2021)Risk Analysis Automation Process in IT Security for Cloud Applications., , and . CLOSER (Selected Papers), volume 1607 of Communications in Computer and Information Science, page 47-68. Springer, (2021)A Semantic Methodology for Security Controls Verification in Public Administration Business Processes., , , and . CISIS, volume 497 of Lecture Notes in Networks and Systems, page 456-466. Springer, (2022)Leveraging Threat Modelling for Effective Penetration Testing in 5G Systems., , , and . CSR, page 180-185. IEEE, (2024)MAVLink Protocol for Unmanned Aerial Vehicle: Vulnerabilities Analysis., , , and . DASC/PiCom/CBDCom/CyberSciTech, page 1-6. IEEE, (2022)Security in IoT Pairing & Authentication protocols, a Threat Model, a Case Study Analysis., , , and . ITASEC, volume 2940 of CEUR Workshop Proceedings, page 207-218. CEUR-WS.org, (2021)MetaSEnD: A Security Enabled Development Life Cycle Meta-Model., , and . ARES, page 152:1-152:10. ACM, (2022)A Methodology for Vulnerability Assessment and Threat Modelling of an e-Voting Platform Based on Ethereum Blockchain., , , and . IEEE Access, (2024)