Author of the publication

Finding Security Vulnerabilities in Unmanned Aerial Vehicles Using Software Verification.

, , and . SIoT, page 1-9. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Keyless car sharing system: A security and privacy analysis., , and . ISC2, page 1-7. IEEE, (2016)Privacy-Enhancing Settlements Protocol in Peer-to-Peer Energy Trading Markets., and . ISGT, page 1-5. IEEE, (2022)Combining BMC and Fuzzing Techniques for Finding Software Vulnerabilities in Concurrent Programs., , , , , and . IEEE Access, (2022)Frictionless Authentication System: Security & Privacy Analysis and Potential Solutions., , and . CoRR, (2018)Finding Security Vulnerabilities in Unmanned Aerial Vehicles Using Software Verification., , and . SIoT, page 1-9. IEEE, (2019)SC2Share: Smart Contract for Secure Car Sharing., , , , and . ICISSP, page 163-171. SciTePress, (2019)Position Paper: Towards a Hybrid Approach to Protect Against Memory Safety Vulnerabilities., , , , , , , , , and . SecDev, page 52-58. IEEE, (2022)Effect of Clustering in Federated Learning on Non-IID Electricity Consumption Prediction., , , and . ISGT-Europe, page 1-5. IEEE, (2022)Privacy-Preserving Billing for Local Energy Markets (Long Version)., and . CoRR, (2024)A survey of safety and trustworthiness of large language models through the lens of verification and validation., , , , , , , , , and 7 other author(s). Artif. Intell. Rev., 57 (7): 175 (July 2024)