Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Connectivity and security in a D2D communication protocol for public safety applications., , , and . ISWCS, page 548-552. IEEE, (2014)Towards a Mobile Malware Detection Framework with the Support of Machine Learning., , , and . Euro-CYBERSEC, volume 821 of Communications in Computer and Information Science, page 119-129. Springer, (2018)Implementation of a wireless test bed for the functional verification of the ultra-wideband Detect-and-Avoid mechanism., , , , and . ISWCS, page 26-30. IEEE, (2010)An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure., , , , , , , , , and . Int. J. Crit. Infrastructure Prot., 3 (3-4): 140-156 (2010)Performance Analysis of Long Short-Term Memory-Based Markovian Spectrum Prediction., , , and . IEEE Access, (2021)Corrigendum to 'VetaDetect: Vehicle tampering detection with closed-loop model ensemble' International Journal of Critical Infrastructure Protection, 37 (2022), 100525., , , , , and . Int. J. Crit. Infrastructure Prot., (2022)Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead., , , , , and . IEEE Commun. Surv. Tutorials, 14 (2): 355-379 (2012)A dynamic model of moving flames for the analysis and control of combustion instabilities., , , , , , and . ECC, page 2795-2800. IEEE, (1999)Identity-based security systems for vehicular ad-hoc networks., , , , and . ICCVE, page 672-678. IEEE, (2013)Updating IoT devices: challenges and potential approaches., , , and . GIoTS, page 1-5. IEEE, (2020)