Author of the publication

Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey.

, , , , , , and . Peer Peer Netw. Appl., 16 (5): 2153-2185 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comparative Study of Schemes for Robust Logical Topology Design in Wavelength Routed WDM Networks., , , and . Wireless and Optical Communications, page 230-236. IASTED/ACTA Press, (2006)Speed Based Distributed Congestion Control Scheme for Vehicular Networks., and . ISCC, page 1-4. IEEE, (2020)Regenerator allocation for scheduled lightpath demands in translucent optical networks., and . ICNC, page 292-296. IEEE Computer Society, (2012)A comprehensive pseudonym changing scheme for improving location privacy in vehicular networks., , and . Internet Things, (2022)New Techniques for Efficient Traffic Grooming in WDM Mesh Networks., , , and . ICCCN, page 303-308. IEEE, (2007)Routing and Wavelength Assignment for Prioritized Demands Under a Scheduled Traffic Model., and . BROADNETS, IEEE, (2006)Minimizing attack radius of scheduled connections in WDM networks., , and . CCECE, page 1-4. IEEE, (2017)Identifying Vulnerabilities and Attacking Capabilities Against Pseudonym Changing Schemes in VANET., , and . ISDDC, volume 11317 of Lecture Notes in Computer Science, page 1-15. Springer, (2018)An Improved ILP Formulation for Path Protection in WDM Networks., , and . HSNMC, volume 3079 of Lecture Notes in Computer Science, page 903-911. Springer, (2004)Optimal regenerator placement in survivable translucent networks., , , and . DRCN, page 1-7. IEEE, (2014)