Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FLaaS6G: Federated Learning as a Service in 6G Using Distributed Data Management Architecture., , , , and . GLOBECOM, page 1247-1252. IEEE, (2022)Enhancing security in Fiat-Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication., , , and . Int. J. Inf. Sec., 23 (2): 1131-1148 (April 2024)PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis., , , , and . CoRR, (2024)SPPS: Secure Policy-based Publish/Subscribe System for V2C Communication., , , , and . DATE, page 529-534. IEEE, (2021)Toward a Multi-Layer Intrusion Response System for Connected Vehicles., , and . VTC Fall, page 1-2. IEEE, (2022)A Policy-based Communications Architecture for Vehicles., and . ICISSP, page 155-162. SciTePress, (2015)Towards an Increased Detection Sensitivity of Time-Delay Attacks on Precision Time Protocol., , , , and . IEEE Access, (2021)Temporal-based intrusion detection for IoV., , , and . it Inf. Technol., 62 (5-6): 227-239 (2020)Quantitative System-Level Security Verification of the IoV Infrastructure., , , , and . CoRR, (2021)Simutack - An Attack Simulation Framework for Connected and Autonomous Vehicles., , , , and . VTC2023-Spring, page 1-7. IEEE, (2023)