Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application level attacks on Connected Vehicle Protocols., , , , , and . RAID, page 459-471. USENIX Association, (2019)Orphan Drug Legislation with Data Fusion Rules Using Multiple Fingerprints Measurements., , , , , and . IBICA, volume 303 of Advances in Intelligent Systems and Computing, page 261-270. Springer, (2014)Secure Ramp Merging using Blockchain., , and . IV, page 401-408. IEEE, (2021)VEhicular Secure Network Open Simulator (VESNOS): A Cyber-security oriented co-simulation platform for connected and automated driving., , and . SIGSIM-PADS, page 108-118. ACM, (2024)Secure Automated and Autonomous Systems. University of California, Riverside, USA, (2022)CVGuard: Mitigating Application Attacks on Connected Vehicles., , , and . IV, page 623-630. IEEE, (2022)Securing Connected Vehicle Applications with an Efficient Dual Cyber- Physical Blockchain Framework., , , , and . IV, page 393-400. IEEE, (2021)5G and Satellite Network Convergence: Survey for Opportunities, Challenges and Enabler Technologies., , , , , and . NILES, page 366-373. IEEE, (2020)Security design for a new local area network AULWLAN.. CompSysTech, page 19-25. ACM, (2003)Minimizing the Dimensionality Problem in mm-Wave with Large Number of Antenna Elements Using Fast CUR-Decomposition., , , , and . IEEA, page 195-201. ACM, (2018)