Author of the publication

A Novel Context-Based Risk Assessment Approach in Vehicular Networks.

, and . AINA Workshops, page 466-474. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile applications for connected cars: Security analysis and risk assessment., and . NOMS, page 1-6. IEEE, (2022)DeepDist: A Deep-Learning-Based IoV Framework for Real-Time Objects and Distance Violation Detection., , , , , and . IEEE Internet Things Mag., 3 (3): 30-34 (2020)On the Design, Development and Implementation of Trust Evaluation Mechanism in Vehicular Networks., , , , and . AICCSA, page 1-7. IEEE Computer Society, (2019)Privacy and Trust in Smart Camera Sensor Networks., and . ARES, page 244-248. IEEE Computer Society, (2015)Vehicular Cloud Networks: Architecture, Applications and Security Issues., , , and . UCC, page 571-576. IEEE Computer Society, (2015)Faith in Vehicles: A Set of Evaluation Criteria for Trust Management in Vehicular Ad-Hoc Network., , , and . iThings/GreenCom/CPSCom/SmartData, page 44-52. IEEE Computer Society, (2017)Evaluation criterias for trust management in vehicular ad-hoc networks (VANETs)., , and . ICCVE, page 118-123. IEEE, (2014)A Comparative Analysis of Trust Models for Safety Applications in IoT-enabled Vehicular Networks., , , and . Wireless Days, page 1-8. IEEE, (2019)MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles., , , , and . IEEE Internet of Things Journal, 7 (4): 3310-3322 (2020)Impact of Silent Periods on Pseudonym Schemes., , , , and . SSD, page 79-85. IEEE, (2021)