Author of the publication

A Look into the Vulnerabilities of Automatic Dependent Surveillance-Broadcast.

, , and . CCWC, page 933-938. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computational theory of short distance reflexive anaphoric devices in Urdu discourse for effective machine translation., , and . FIT, page 19:1-19:6. ACM, (2009)An Optimal Order of Factors for the Computational Treatment of Personal Anaphoric Devices in Urdu Discourse., , and . IJCNLP, page 81-90. The Association for Computer Linguistics, (2008)A Look into the Vulnerabilities of Automatic Dependent Surveillance-Broadcast., , and . CCWC, page 933-938. IEEE, (2023)Using Authenticated Encryption for Securing Controller Area Networks in Autonomous Mobile Platforms., , , , , and . WPMC, page 76-82. IEEE, (2023)Projecting Farsi POS Data To Tag Pashto., , , and . RANLP Student Research Workshop, page 25-32. RANLP 2011 Organising Committee, (2011)Towards Domain Adaptation for Parsing Web Data., , and . RANLP, page 357-364. RANLP 2013 Organising Committee / ACL, (2013)Applying Architectural Constraints in the Modeling of Self-adaptive Component-based Applications, , and . Model-Driven Software Adaptation (M-ADAPT'07) at The European Conference on Object-Oriented Programming (ecoop07), 1, page 13-22. (July 2007)A Context Query Language for Pervasive Computing Environments, , , , , , , and . 5th IEEE Workshop on Context Modeling and Reasoning (CoMoRea) in conjunction with the 6th IEEE International Conference on Pervasive Computing and Communication (PerCom), IEEE Computer Society Press, (2008)Ontology for feature based selection of web development tools., , , and . ICDIM, page 90-95. IEEE, (2013)Inclusion results for convolution submethods., and . Int. J. Math. Mathematical Sciences, 2004 (2): 55-64 (2004)