Author of the publication

Hybrid Approach to Detect Position Forgery Attacks in Connected Vehicles.

, and . NoF, page 47-51. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relay node placement with energy and buffer constraints in wireless sensor networks using mobile data collector., , , and . Int. J. Sens. Networks, 8 (3/4): 147-159 (2010)An Adaptive Power Level Control Algorithm for DSRC Congestion Control., , and . DIVANet@MSWiM, page 57-62. ACM, (2018)Minimum Energy Strong Bidirectional Topology for Ad Hoc Wireless Sensor Networks., , , , and . ICC, page 1-5. IEEE, (2009)Optimal Load Balanced Clustering in Two-Tiered Sensor Networks., , and . BROADNETS, IEEE, (2006)Dynamic provisioning of fault tolerant optical networks for data centers., , , and . CCECE, page 1-4. IEEE, (2017)Kalman Filtering to Track Changes in Pupil Size for Automated Driving Systems., , , and . VTC Fall, page 1-6. IEEE, (2021)Energy Aware Fault Tolerant Routing in Two-Tiered Sensor Networks., , and . ICDCN, volume 6522 of Lecture Notes in Computer Science, page 293-302. Springer, (2011)Disaster-aware WDM network design for data centres., , and . ICDCN, page 38. ACM, (2017)Security-Aware Dynamic Lightpath Allocation Scheme for WDM Networks., , , and . ICDCN, page 12:1-12:4. ACM, (2015)Hybrid Approach to Detect Position Forgery Attacks in Connected Vehicles., and . NoF, page 47-51. IEEE, (2023)