Author of the publication

Vulnerability Analysis of Interdependent Critical Infrastructures upon a Cyber-attack.

, , and . HICSS, page 1-10. ScholarSpace, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid wavelet - DCT intra prediction for H.264/AVC interactive encoder., , , , and . ChinaSIP, page 281-285. IEEE, (2014)Packet Drop and RSSI Evaluation for LoRa: An Indoor Application Perspective., , , and . WF-IoT, page 913-914. IEEE, (2021)Speech Emotion Recognition using Supervised Deep Recurrent System for Mental Health Monitoring., , , , , and . WF-IoT, page 1-6. IEEE, (2022)Using Internet of Vehicle Technology for Decreased Medical Response Times., , , , and . ICSDE, page 27-32. ACM, (2018)Securing a Vehicle Fleet Management Through Blockchain and Internet of Things., , , and . iSES, page 151-154. IEEE, (2020)A LoRa Based Reliable and Low Power Vehicle to Everything (V2X) Communication Architecture., , , and . iSES, page 177-182. IEEE, (2020)Vulnerable C/C++ code usage in IoT software systems., , , , and . WF-IoT, page 348-352. IEEE Computer Society, (2016)Advancement of Routing Protocols and Applications of Underwater Wireless Sensor Network (UWSN) - A Survey., , and . J. Sens. Actuator Networks, 9 (2): 19 (2020)Low-Cost Architecture for an Advanced Smart Shower System Using Internet of Things Platform., and . CoRR, (2023)A Deep Analysis of Textual Features Based Cyberbullying Detection Using Machine Learning., , and . GCAIoT, page 166-170. IEEE, (2022)