Author of the publication

Quantum Man-in-the-Middle Attacks on QKD Protocols: Proposal of a Novel Attack Strategy.

, , , , and . IC3I, page 513-519. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Metaverse or Metaworst with Cybersecurity Attacks., and . IT Prof., 25 (3): 54-60 (May 2023)A novel machine learning-based framework for detecting fake Instagram profiles., , , , and . Concurr. Comput. Pract. Exp., (2022)An electronic warfare approach for deploying a software-based Wi-Fi jammer., , and . IC3I, page 43-47. IEEE, (2022)Employing Convolutional Neural Network for IoT Healthcare Attack Detection in Intensive Care Unit., , , and . IC3I, page 798-803. IEEE, (2023)Demystifying Blockchain in 5G and Beyond Technologies.. J. Mobile Multimedia, 18 (5): 1379-1398 (2022)OCSRL: An Model-Based Reinforcement Learning Approach to Optimize Energy Consumption of Cooling Systems., and . e-Science, page 1-10. IEEE, (2023)A Real-Time Non-Invasive Anomaly Detection Technique for Cooling Systems., and . EI.A, volume 14467 of Lecture Notes in Computer Science, page 135-151. Springer, (2023)Quantum Man-in-the-Middle Attacks on QKD Protocols: Proposal of a Novel Attack Strategy., , , , and . IC3I, page 513-519. IEEE, (2023)Investigating Patterns of UAV Attacks for Building Secure UAV Network., , and . IC3I, page 136-141. IEEE, (2023)Secure framework against cyber attacks on cyber-physical robotic systems., , , , and . J. Electronic Imaging, (2022)